Cyber Malware Analyst
Job ID 165387BR Date posted 01/12/2021 City Rosslyn State VA Country United StatesRaytheon Intelligence and Space (RIS) - Cybersecurity, Training & Services (CTS) has an immediate job opening for a Cyber Malware Analyst to support a US Federal Agency contract to enable mission accomplishment by having experience understanding and analyzing cyber tools and malware samples in support of active investigations, creating cyber intelligence products. The analyst will utilize tools, sources, methods and data to provide context about the evolving threat landscape. The successful candidate must have the ability to interpret and analyze large, ambiguous data sets and experience in writing analysis reports.Work Location: National Capital Region (Rosslyn, VA)Job Description:Resolves highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering. Discovers, analyzes, diagnoses, and reports on malware events, files and network intrusion and vulnerability issues. Recommends counter measures to malware and other malicious type code and applications that exploit customer communication systems. Conducts reverse engineering for known and suspected malware files. Develops analysis and make recommendations for the purchase of hardware and or software that will mitigate malware intrusions. Develops policies and procedures to investigate malware incidents for the entire computer network. Assists in the development and delivery of malware security awareness products and briefings.Job Responsibilities:Shall perform specific activities that include, but not limited to the following: Provide analysis support 24x7x365 Render technical assistance for criminal investigations and non-security related operational events as needed Contribute input to the Cyber Security Daily (CSD) Conduct advance analysis and recommend remediation steps for cyber security events and incidentsRequired Skills: Experience with malware analysis and reverse engineering, network analysis tools, static and dynamic analysis tools Ability to automate analysis tasks, develop scripts to decode obfuscated data and network communications, analyze obfuscated code Understanding of software exploits, identifying host- and network-based indicators, using leading forensic tools such as but not limited to Access Data FTK, Guidance EnCase, Paraben P2 eXplorer, X-Ways Forensics, FireEye, Volatility, CloudStrike Knowledge with using mobility and open source forensic tools like Magnet Axiom, BlackBag Mobilyze, Cellebrite UFED, Paraben E3:DS, The Sleuth Kit (TSK) and Autopsy, BlackBag tools Proficient with malware analysis, sandboxing, and software reverse engineering Experience with scripting languages such as Python and PowerShell Knowledge of MITRE ATT&CK framework, and its uses within the cybersecurity community Knowledge of and practical experience of integration of COTS or open source tools Personality traits: Naturally curious and inquisitive nature; persistent and determined; loves solving problems and puzzles; analytically rigorous; uncompromising integrity Demonstrated ability to document processes Proficiency with MS Office Applications Must be able to work collaboratively across teams and physical locations Willing to work rotating shifts Must have a Top Secret Clearance or the ability to obtain a TS/SCI clearanceRequired Certifications:Possess at least one relevant professional designation or related advanced IT certification, but not limited to the following: Certified Information Systems Security Professional (CISSP) GIAC Reverse Engineering Malware (GREM) GIAC Certified Incident Handler (GCIH) GIAC Network Forensic Analyst (GNFA) GIAC Intrusion Analyst (GCIA)Desired Skills: Experience with RSA Netwitness, Splunk, FireEye NX, EX, HX, AX, Carbon Black Response, RSA Archer Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology) Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of the following: Experience in computer intrusion analysis and incident response Working knowledge of Intrusion detection/protection systems Knowledge and understanding of network devices, multiple operating systems, and secure architectures Working knowledge of network protocols and common services System log analysis Experience with SIEMS content analysis, development and testing, tools such as NetWitness, Splunk, SumoLogic, QRadar Experience with EDR solutions (Carbon Black, Crowdstrike, FireEye, SentinelOne) Familiarity with packet analysis to include: HTTP Headers & Status codes, SMTP Traffic & Status codes, FTP Traffic & Status Codes Excellent written and verbal communication skills Prior experience working in any of the following: Security Operations Center (SOC) Network Operations Center (NOC) Computer Incident Response Team (CIRT)Desired Certifications:Possess at least one relevant professional designation or related advanced IT certification, but not limited to the following: GIAC Certified Enterprise Defender (GCED) GIAC Security Expert (GSE) Certified Information Security Manager (CISM) Certified Ethical Hacker (CEH)Required Education (including Major):Bachelor of Science Degree with major in Computer Science/Electrical Engineering, Engineering, Science or related field. Must have a minimum of 5+ years' experience or equivalent education and experience. Occasional travel within CONUS and OCONUS is required165387Raytheon Technologies is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.