- System One (Huntsville, AL)
- …threat environments. Has applied knowledge related to forensic, network, and malware analysis. Experience working in team environments for software development. ... data to include malicious software reverse engineering, network traffic analysis, memory forensics , disk forensics , etc. Perform static and dynamic analysis of… more
- Noetic Strategies Inc. (Huntsville, AL)
- …threat environments. + Has applied knowledge related to forensic, network and malware analysis. + Experience working in team environments for software development. + ... data to include malicious software reverse engineering, network traffic analysis, memory forensics , disk forensics , etc. + Perform static and dynamic analysis… more
- MartinFederal Consulting, LLC (Huntsville, AL)
- …technical data within cyber threat environments + Apply forensic, network, and malware analysis techniques to identify and mitigate threats + Collaborate in ... reverse engineering of malicious software, network traffic analysis, memory forensics , and disk forensics + Perform static...+ GIAC Certified Incident Handler (GCIH) + GIAC Forensic Analyst (GCFA) + GIAC Intrusion Analyst (GCIA)… more
- TekSynap (Ashburn, VA)
- …a strong cyber security background with experience in: host and network-based forensics related to the identification of advanced cyber threat activities, intrusion ... detection, malware identification, and security content development (eg, signatures, rules,...experience as a Tier III senior cyber threat hunt analyst performing threat analysis, technical analysis, and network asset… more
- altafiber (Honolulu, HI)
- …such as IT Security Architect, IT Security Engineer, IT Security Auditor, Cyber-Security Analyst , Cyber-Intelligence Analyst + Must be able to obtain additional ... of information security threat types, their composition, and IOCs Dynamic Malware Analysis Experience. + Knowledge of attacker tactics, techniques, and procedures… more
- Compass Group, North America (Charlotte, NC)
- …Tenant, Google SecOps, and Crowdstrike experience preferred. . Familiarity with malware analysis, forensics , and reverse engineering. . Strong understanding ... . CISSP, CISM, GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), or similar. **Technical Skills** . In-depth knowledge of security… more
- Shuvel Digital (Pensacola, FL)
- …supporting Client, Federal Civil, Intelligence and/or DoD Customers * Computer Forensics experience * Malware reverse engineering experience * Experience ... development and deployment * Prior experience with data visualization products such as Analyst Notebook * Prior experience working in one of the following highly… more