Sr. Cybersecurity Malware Analyst

Rosslyn, VA
Dec 15, 2016
Jun 05, 2017
Full Time

About Web is currently seeking qualified candidates for a Sr. Cybersecurity Malware Analyst in Rosslyn, VA.


We are seeking a Senior Cybersecurity Malware Analyst - This person needs to be experienced, inquisitive and able to research new highly technical subjects. Perform analysis of host and network logs to identify malicious Advanced Persistent Threat (APT) activity. Perform digital forensics on media associated with compromised hosts to assess the scope and nature of intrusions. Identify and dissect highly targeted attacks and other suspicious activity using a variety of network based tools. Provide accurate and rapid reporting of in-depth technical analysis results in written form. Works independently and provides mentorship to junior technical staff as needed.


-Identify threats from the mobile platform

-Research/Deep Dive into potential exploitation methods

-Provide recommendations to operate with the most secure technical configurations and settings for mobile devices

-Identifying and analyzing Network Security appliance logs

-Hunting for activity that is not normally detectable through security appliances

-Providing mitigation suggestions in the context of a security incident, as it relates to the technical analysis of malware or other attack artifacts

-Performing independent research to better understand complex technical problems

-Providing oral briefings on complex technical subjects to senior management and other non-technical audiences

-Build and lead team of analysts focused on mobile threat analysis and mobile security concerns


Experience 8+ years with 2 or more of the following is desired:

1. Mobile Threat Analysis

- Real-world experience with top MDM solutions

- Strong background in Security Event Analysis

- Experience testing security of MDM configurations

- Experience performing Mobile malware analysis

- Experience working with Blackberry, Android, and IOS

2. Network Forensics Analysis

- Experience with log correlation utilities like SPLUNK or Elastic Search

- Experience reviewing network traffic logs to identify malicious activity

- Experience reviewing and hardening network configurations

- Experience with Snort or other network-based signature development

- Monitoring using commercial tools

- BRO scripting experience is a big plus

3. Static Binary Analysis

- Use of industry standard tools

- Experience with one or more programming languages, preferably at least one high level and one low level language. Examples include Python, Java, C, and x86 ASM

- Proficient with analysis/triage of Windows malware to obtain technical indicators

4. Dynamic Binary Analysis

- Experience with Disassemblers and Debuggers

- Proficient with analysis/triage of Windows malware to obtain technical indicators

5. Host Forensic Analysis

- Experience with tools like EnCase, FTK, Volatility

- Experience with Yara, OpenIOC, or other host-based signature development

- Experience across multiple platforms (Windows, Linux, Mac, iOS, Android)

Desired Certifications:


Desired Education:

MS or BS in: Computer Engineering, Computer Science, Electrical Engineering, Information Technology, Computer Forensics or related field, or appropriate amount of direct experience to match responsibilities and qualifications.

Person must be clearable. You can start with an interim secret clearance and we will process you to the TS/SCI level.


Similar jobs