- Caterpillar, Inc. (Nashville, TN)
- …that occur within Caterpillar's global network. This includes investigating Malware alerts, Phishing emails, anomalous activity, and anomalous network traffic. ... respond to all reported emails. + Inspect file attachments and links for potential malware . + Investigate network alerts through the IDS tool. + Ensure accurate case… more
- Palo Alto Networks (VA)
- …are leveraged to the full extent. Ensure threat actors, industry, region, and malware profiles are continuously updated on a recurring basis.. 4. Leverage AI for ... including actionable knowledge of cyber adversary groups, tactics, and techniques, malware analysis, and hunting methodologies. + Expert-level understanding of how… more
- UIC Government Services and the Bowhead Family of Companies (Wright Patterson AFB, OH)
- …and possible insider threats * Collect intrusion artifacts (eg, source code, malware , and trojans) * Correlate incident data to identify specific vulnerabilities and ... all subscribers * Perform forensic analysis of systems and malware in cases where subscribers lack the capability and...due to cyber incidents * Contain the spread of malware to prevent further damage to IT systems through… more
- TekSynap (Ashburn, VA)
- …on cybersecurity events and incidents, including (but not limited to) phishing, malware , and scanning / probing activity. Prioritizing cyber threat actor tactics, ... of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (eg, signatures, rules, etc.);… more
- Cipher Tech Solutions (Vienna, VA)
- …other forensic software tools + SANS certifications + Experience with malware analysis Benefits: + Mission focused work environment + Subsidized ... tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing… more
- TekSynap (Ashburn, VA)
- …and group mailboxes. + Performing static and dynamic file analysis to identify malware characteristics, intent, and origin. + Conducting malware analysis and ... providing Malware Analysis Reports. + Providing requirements, playbooks, and workflows to support automation of Cyber Defense Forensics tasks. + Make recommendations for Zero Trust readiness and architecture for Cyber Defense Forensics (CDF) assigned tasks… more
- Leidos (Bethesda, MD)
- …servers (Linux and Windows) with the management console + Deploying malware protection software (currently Trellix Endpoint Threat Protection) updates and improved ... troubleshoot issues with integration (including cases where excessive real time malware scans are believed to be impeding mission performance) + Determine… more
- Providence (Irvine, CA)
- …overall cyber threat and risk awareness. + Classify, categorize, and analyze malware and threats. Translate this into actionable detections using frameworks such as ... the healthcare industry threat landscape, including adversaries and their targets, malware , TTPs, emerging threats, and trends that may impact the organization.… more
- 3M (Austin, TX)
- …+ Conduct advanced investigations of security alerts and incidents, including malware analysis, lateral movement, and data exfiltration. + Perform threat hunting ... PowerShell) is a plus. + Familiarity with threat intelligence platforms, malware analysis tools, and adversary simulation frameworks. + Industry certifications such… more
- BlueVoyant (College Park, MD)
- …attacker activity while tracing a labyrinth of domain registrations and ripping apart malware . When you say "it's bad" everyone jumps into action. Beyond technical ... to determine reputation and suspicious attributes + Perform analysis of malware , attacker network infrastructure, and forensic artifacts + Execute complex… more