View all jobs

Malware Engineer, End Point, Network Security

Arlington, VA
As a senior Malware Engineer for our team at the Pentagon you will be responsible for 
  • Incident Handling
  • End Point Security
  • Network Security.
  • Demonstrate expert-level knowledge of network traffic and communications, including known ports and services
  • Demonstrate expert knowledge of the Windows operating system, expert knowledge in various Linux distributions and the Unix framework
  • Have expert level knowledge of the following security related technologies: IPS, IDS, SIEM, firewalls, DNS, encryption, HIDS, NIDS, proxies, network packet analyzers, malware analysis, forensic tools, and enterprise level appliances
  • Demonstrate a deep understanding of various open source and commercial analysis tools used for reverse engineering
  • Demonstrate knowledge of and familiarity with the ARM instruction set
  • Demonstrate the ability to analyze   complex malicious Windows programs in a reasonable time frame
  • Demonstrate expert technical ability in reverse engineering custom protocols used by malware
  • Demonstrate intermediate proficiency with one of the following programming languages: Python, C, C++, Ruby
  • Design and develops new systems, applications, and solutions for external customer's enterprise-wide cyber systems and networks.
  • Ensure system security needs established and maintained for operations development, security requirements definition, security risk assessment, systems analysis, systems design, security test and evaluation, certification and accreditation, systems hardening, vulnerability testing and scanning, incident response, disaster recovery, and business continuity planning and provides analytical support for security policy development and analysis.
  • Integrate new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis of cyber security features and relates existing system to future needs and trends, embeds advanced forensic tools and techniques for attack reconstruction, provides engineering recommendations, and resolves integration and testing issues.
Basic Qualifications:
  • Top Secret w/SCI eligibility
  • BS or equivalent + 14 yrs related experience, OR MS + 12 yrs related experience
  • 6+ years of Incident and Malware analysis experience in the DOD or IC environment
  • Have an understanding of DOD accreditation policies, processes, and practices
  • Experience with CJCSM 6510.01B
  • Experience in planning, directing, and managing Computer Incident Response Team (CIRT) operations in an organization similar in size
  • Must have expert-level knowledge of the X86 Instruction set
Must have/or be able to Obtain within 90 Days of Hire:
  • Specific to this Position: Certified Ethical Hacker (CEH) Certification
  • DoD 8570 IAT Level II Certification (ONE of the following): GSEC, Security +, SSCP, CCNA-Security, CySA+, GIC SP
  • DoD 8570 IASAE/CND/ CND-IR Certification (ONE of the following): CEH, GCIH, CSIH, SCYBER, CySA+, GCFA, CFR

Powered by