• Information System Security Manager

    SAIC (Chantilly, VA)
    …of Action and Milestones. + Monitor and address cyber risks such as malware , zero-day attacks, denial of service attacks, as well as associated mitigations regarding ... etc. + Demonstrated experience with computer and network vulnerabilities (eg, malware , zero-day attacks, denial of service attacks, etc.). REQNUMBER: 2510066 SAIC… more
    SAIC (01/06/26)
    - Related Jobs
  • Senior Adversarial Emulation - Red Team Operator

    Centene Corporation (Olympia, WA)
    …and Response (EDR) systems + Lead the development of advanced malware solutions for offensive security operations, ensuring robust functionality and adaptability ... skills **License/Certification:** + Certifications are desired, but not required + Malware Dev Academy + Offensive Security Experienced Penetration (OSEP) +… more
    Centene Corporation (01/06/26)
    - Related Jobs
  • Senior Cyber Threat Researcher (Remote)

    AbbVie (Atlanta, GA)
    …of these assets with technical teams. + ​Capable of conducting static and dynamic malware analysis, as well as interacting with outputs from common malware ... analysis tools. + ​Scripting skills (eg, Python, PowerShell) for automation, enrichment, and analysis. + ​Experience analyzing event data from a variety of security controls (firewalls, IPS/IDS, endpoint/AV/EDR, network analyzers) and enterprise log management… more
    AbbVie (01/06/26)
    - Related Jobs
  • Information Security Analyst II

    Institute of Electrical and Electronics Engineers (Piscataway, NJ)
    …and intrusion prevention strategies (eg Firewalls, Security Event Correlation, Malware Detection, IDS/IPS), Identity & Access Management technologies and concepts ... detection / protection, and network anomaly detection), host based security (Anti- malware , firewall, intrusion detection / protection, patch management and file… more
    Institute of Electrical and Electronics Engineers (01/05/26)
    - Related Jobs
  • Embedded Reverse Engineer: All Levels - Future…

    Cipher Tech Solutions (Tampa, FL)
    …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
    Cipher Tech Solutions (01/02/26)
    - Related Jobs
  • Consulting Director, DFIR, Reactive Services (Unit…

    Palo Alto Networks (Chicago, IL)
    …major operating systems (Microsoft Windows, Linux, or Mac) + Knowledge of common malware persistence mechanisms + Experience identifying and triaging malware + ... Experience leading technical breach response teams in fast-paced environment + 10 years of hands-on consulting experience in digital forensics, and incident response **Your Experience** + Strategic mindset but also detail-oriented and hands-on ability to lead… more
    Palo Alto Networks (01/01/26)
    - Related Jobs
  • Counterintelligence Threat Technical Analyst

    ManTech (Springfield, VA)
    …systems and propose corrective actions or software recommendations to mitigate malware intrusions. + Develop Requirements and Document Best Practices: Identify, ... in a Science, Technology, Engineering or Mathematics discipline. + Experience with malware analysis. **Clearance Requirements:** + Must have a TS/SCI with the… more
    ManTech (01/01/26)
    - Related Jobs
  • Senior Security Engineer

    Unum Group (Dunwoody, GA)
    …and remote access technologies + End Point Security products (ie Anti-virus, Malware , Hard Drive encryption) + Ethical Hacking, Incident Response and case ... Experience in implementing and operating global end-point security products (anti-virus, anti- malware , hard drive encryption, DLP, etc.) + Security Coding Standards… more
    Unum Group (01/01/26)
    - Related Jobs
  • ACTI Cyber Threat Exploitation Engineer , Amazon…

    Amazon (Arlington, VA)
    …provide reversing requirements as well as be able to independently triage malware , analyze exploit samples, and study attack techniques to understand how ... and the creation of corresponding detections and/or countermeasures - Experience with malware analysis, network flow analysis, and large scale data analysis -… more
    Amazon (12/31/25)
    - Related Jobs
  • Mobile Developer: All Levels (Requires TS Level…

    Cipher Tech Solutions (Vienna, VA)
    …tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing ... federal and military law enforcement, counterintelligence, and counter terrorist activities. Malware reverse engineering is the practice of analyzing malicious code.… more
    Cipher Tech Solutions (12/31/25)
    - Related Jobs