Malware Analyst II (MA2)
Tasks
- Analyze malware to identify vulnerabilities
- Analyze network traffic and incident handling
- Analyze security concepts protocols processes architectures and tools
- Conduct vulnerability assessments and penetration tests
- Develop design specifications through inspection and analysis
- Ensure software standards and perform software design development testing and debugging
- Maintain malware analysis tools techniques and countermeasures
- Participate in technical briefings and proposals
- Perform reverse engineering and static and dynamic malware analysis
- Recreate programs to exploit weaknesses or strengthen defenses
Perks/Benefits
- N/A
Skills/Tech-stack
Access Control | Android | Assembly | Authentication | C# | C++ | Computer Security | Dynamic analysis | Encryption | Incident Response | Intrusion Detection | Malware analysis | Network Traffic | Network Traffic Analysis | Penetration Testing | Reverse Engineering | Static Analysis | Traffic analysis | Unix | Vulnerability Assessment | Windows
Education
N/A
Roles
Analyst | Cyber Threat Analyst | Malware Analyst | Threat Analyst
Related jobs
-
Cybersecurity Risk and Compliance Analyst USD 67K-119K800-53 | Audit evidence | Audit evidence management | Authorization Lifecycle | Change ManagementPaid time off | Recognition programs | Remote work | Volunteer days | Wellness initiativesMid-level Full TimeUnited States R11h ago
-
Target Analyst Reporter USD 110K-195KCode disassembly | Debugging | Exploit Development | File Hashing | Fuzzy File HashingActive TS/SCI Clearance | Full Scope PolygraphSenior-level Full TimeLinthicum, MD19h ago
-
Junior Consultant USD 70K-82K800-53 | AI tools | Access Management | CIS Controls | Compliance401K Plan Eligibility | Dental insurance | Disability insurance | Life insurance | Medical insuranceEntry-level Full TimeNashville, TN, US20h ago
-
Cybersecurity Analyst - Data Protection USD 79K-153KABAC | AWS | Access Control | Alation | AuditingMid-level Full TimeTwo Destiny Way, Westlake TX, United …21h ago
-
Cyber Kill Chain | Defense in Depth | Detection Systems | Event management | Incident Response247 shift work | Weekend hoursSenior-level Full TimeArlington, VA1d ago
-
Access Controls | Certification and accreditation | Configuration Management | Encryption | NIST RMFSenior-level Full TimeFort George G Meade, MD1d ago
-
C# | C++ | Detection rules | Dynamic analysis | FireEye AXMultiple shifts availableMid-level Full TimeSan Antonio, TX1d ago
-
Anti-forensics | Chain of Custody | Data Recovery | Data decryption | Deleted data recoveryMid-level Full TimeSan Antonio, TX1d ago
-
Cybersecurity | Data Policies | Data Standards | Hypothesis Testing | ScriptingActive Top Secret clearanceMid-level Full TimeColumbia, MD1d ago
-
Adversary TTPs | Automated Assessment | Course of Action | Course of Action Analysis | Cyber ThreatMid-level Full TimeLinthicum Heights, MD1d ago
-
Android | Assembly | C# | C++ | Computer Network ExploitationTS SCI security clearance with CI polySenior-level Full TimeLinthicum Heights, MD1d ago
-
Senior-level Full TimeFort George G Meade, MD1d ago
-
Adversary tactics | Adversary tactics and techniques | Cloud Security | Cyber Threat | Cyber incidentMid-level Full TimeFort George G Meade, MD1d ago
-
800-53 | ACAS | ATO | Assessment and Authorization | CNSSI 1253Mid-level Full TimeReston, VA1d ago
-
Cyber Defense | Cyber Defense Tools | Cybersecurity monitoring | Data collection | Defense toolsOnsite support | Remote workMid-level Full TimeArlington, VA1d ago
-
Attack Framework | Computer Network Defense | Computer network | DMZ | DNSMid-level Full TimeArlington, VA1d ago
-
Data collection | Event Correlation | Event management | Incident Response | Intrusion DetectionSenior-level Full TimeArlington, VA1d ago
-
Alert validation | Event Correlation | Event management | Incident Handling | Intrusion Alert ValidationActive clearance support | Onsite work | Remote workMid-level Full TimeArlington, VA1d ago
-
Cyber Defense | Cyber Defense Tooling | Detection Systems | Event Correlation | Event managementMid-level Full TimeArlington, VA1d ago
-
Adversary Techniques | Adversary tactics | All-source research | Command and control | Digital forensicsSenior-level Full TimeArlington, VA1d ago
-
Cyber Security Analyst (TS/SCI Rquirement) USD 86K-128KCyber Threat | Cyber threat hunting | Defense in Depth | Event Correlation | Event managementShift work | Training and self studyMid-level Full TimeArlington, Virginia1d ago
-
Bash | Cause analysis | Cellebrite | Chain of Custody | Cloud servicesSenior-level Full TimeNY, NY1d ago
-
SOC Analyst USD 52K-72KFirewall Logging | Incident Response | Intrusion Detection | Intrusion Detection System | Microsoft 365401k matching | Flexible spending accounts | Health, dental, vision insurance | Paid Holidays | Paid time offMid-level Full TimeDurham, NC, US1d ago
-
IT Application Security Analyst USD 150K-180KAPI Security | Application Security | Azure Key Vault | CCPA | CI/CD401k | Dental insurance | Disability insurance | Flexible spending account | Health insuranceMid-level Full TimeBethlehem, PA, US, 180152d ago
-
Information Security Analyst USD 100K-137K800-53 | ACAS | Application Security | Application Security Testing | BurpSuiteHybrid work | On-call availabilityMid-level Full TimeTampa, FL2d ago