Cyber Security Analyst
Chantilly, VA, United States
Full Time Entry-level / Junior Clearance required USD 30K - 57K * est.
Overview
Cyber Security Analyst Chantilly, VA TS/SCI with PolyAt Bcore, our strength comes from how we deliver impact to the mission. Whether it’s architecting critical IT solutions, producing actionable intelligence, or developing cutting edge technology, we succeed because of the expertise, collaboration, and agility of our teams. Our Mission Services division combines enterprise IT, cloud solutions, DevSecOps, systems engineering, software development, and operational support. Our goal is not to simply support efforts, but to ignite a technology revolution, bridging the growing technology gap between the Government and commercial space.
Do you want to join a team that is building tailored technical solutions to modernize our government’s mission and our client’s business? Do you have a desire to change how people work? Are you interested in helping to protect our nation’s cyber interests? Join our growing team supporting customer missions as a Cyber Security Analyst in Chantilly, Virginia.
Responsibilities
The Sponsor supports a diverse set of corporate goals across the organization by conducting technical risk assessments and providing technical risk mitigation guidance on use of various enabling technologies supporting the broader organization’s activities. These technologies range from commercial to customized IT-based products and solutions, to include endpoint devices, applications, networked systems and supporting infrastructures, and system architectures. The Sponsor also provides risk management guidance, to mitigate threats to technology procurement and supply chain, conducts hands-on digital forensic examinations and reverse engineering of nefarious technology embedded on endpoint devices that may pose a threat of Sponsor equities, and delivers technical consultation support to risk investigations and threat issues. The Sponsor leverages specialized technology, techniques, and tools, combined with subject matter expertise, to conduct these activities in support of its corporate office, as well as external partners and stakeholders.
Qualifications
Required Qualifications:
- Demonstrated experience performing hands-on forensic review of devices to include laptops and mobile devices, using open source or commercial forensic tools, such as EnCase, FTK, X-Ways, Magnet IEF, or BlackLight.
- Demonstrated experience handling and imaging various types of evidence from Solid State Drives (SSD), Hard Disk Drives (HDD), Thumb Drives, Volatile Memory, or Compact Disks.
- Demonstrated experience with data extraction and analysis from various data sources including files, logs, directories, unallocated space, raw images, and custom databases.
- Demonstrated experience parsing data types necessary to extract metadata and content of forensic value from various data sources.
- Demonstrated experience and in depth understanding of multiple operating systems such as Windows, Linux, iOS, and Android.
- Demonstrated experience performing hands-on forensic review or reverse engineering of modern mobile devices such as Google Android or Apple iOS.
- Demonstrated experience working with virtualization software and virtualized environments to include ESXi, VMWare, or VirtualBox.
- Demonstrated experience conducting analysis of identified malicious software or code using both static and dynamic malware analysis.
- Demonstrated experience using debuggers and disassemblers such as OllyDbg, WinDbg, IDA Pro, or Binary Ninja.
- Demonstrated experience understanding system kernel level processing to detect and report on significant kernel events such as root kits, hooked functions, call tables, and data structures.
Desired Qualifications
- Demonstrated experience using programming skills using scripting languages such as Perl, Python, or Bash.Demonstrated experience with Sponsor’s enterprise and operational activities, capabilities, technical development programs.Demonstrated experience with Sponsor’s information cyber security policies and regulations.Demonstrated experience with risk management standards, Committee on National Security Systems Publication (CNSSP) 1253, Federal Information Processing Standards (FIPS) 140-2, 199, 200, and National Institute of Standards and Technology (NIST) Special Publication 800-37, 800-39, 800-53.
What you can expect from us
BCore is proud to be an equal opportunity workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, sexual orientation or any other characteristic protected by law.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Android Bash Binary Ninja Cloud DevSecOps EnCase IDA Pro iOS Linux Malware NIST NIST 800-53 OllyDbg Open Source Perl Python Reverse engineering Risk assessment Risk management Scripting TS/SCI VirtualBox VMware WinDbg Windows
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.