Minimum requirements:
- Bachelor's degree and a minimum of 9 years' total cyber experience with 5 years' specific to Malware; or 6 years with a Master's; or a high school diploma/equivalent with 4 additional years' relevant Malware experience.
- Possess ONE of the following CERTS:
- CASP+ CE, CCNA Cyber Ops, CCNA-Security, CCNP Security, CEH, CFR, CHFI, CISA, CISSP (or Associate), CISSP-ISSAP, CISSP-ISSEP, CySA+, GCED, GCFA, GCIH, SCYBER.
- Demonstrated experience performing static and dynamic analysis techniques. Experience using sandbox and other simulated networked environments for analysis. Strong critical, creative, and analytical thinking skills.
- Expertise in discovering, analyzing, diagnosing, and reporting on malware events, files, network intrusion, and vulnerability issues.
- Ability to recommend sound countermeasures to malware and other malicious code and applications that exploit customer communication systems.
- Experience developing technically detailed reports that translate complex technical information for non-technical audiences.
- U.S. citizenship required.
- An active Secret security clearance required, with the ability to obtain Top Secret/SCI clearance.
Peraton is seeking an experienced Malware Analyst to support the TASO mission within our DSCM program supporting the Department of State.
Location: Arlington, VA; Hybrid. Must be local and able to come on-site regularly/as needed.
The Cyber Threat Analysis Division's (DS/CTI/CTAD) Technical Analysis and Special Operations (TASO) team conducts advanced cyber threat network hunting, technical analyses (e.g., analysis of malicious code, network traffic, Web log data), and forensic reviews of storage media.
What you'll do:
The Malware Analyst will be responsible for:
- Performing dynamic and static analysis of malware or suspected malware to determine functionality and capabilities.
- Conducting behavioral analysis through sandboxing and virtual machines to simulate enterprise environments.
- Reverse engineering malware samples using debugging tools.
- Providing written technical reports on the scope, nature, and characteristics of malicious code, identifying malware IOCs, TTPs, and recommending countermeasures.
- Performing advanced network threat hunting to detect malicious or suspicious behavior on Department's on-premises and cloud networks.
- Responding to security events from CIRT with comprehensive findings and remediation recommendations.