Enable job alerts via email!

Media Malware Analyst, Journeyman

AECOM

Odenton (MD)

On-site

USD 104,000 - 190,000

Full time

4 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Leidos is hiring a Journeyman-level Media Malware Analyst to support USCYBERCOM operations. The successful candidate will be responsible for detecting and analyzing malware threats, conducting forensic investigations, and collaborating with various cybersecurity teams. A strong background in malware analysis and an active Top Secret clearance are required for this critical role. Join us to make a meaningful impact in national security.

Qualifications

  • 8+ years' experience in malware analysis and incident handling.
  • Active Top Secret clearance with SCI eligibility required.
  • Demonstrated proficiency with tools like IDA Pro and Ghidra.

Responsibilities

  • Conduct forensic analysis of malware threats and digital media.
  • Draft and support implementation of security incident response policies.
  • Create technical analysis reports with actionable intelligence findings.

Skills

Malware Analysis
Incident Handling
Reverse Engineering
Cyber Threat Analysis
Critical Thinking
Communication

Education

BA/BS degree or higher in Computer Science

Tools

IDA Pro
Ghidra
Wireshark
Volatility

Job description

**Description**

**Looking for an opportunity to make an impact?**

At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers’ success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. The Leidos National Security Sector (NSS) combines technology-enabled services and mission software capabilities in the areas of cyber, logistics, security operations, and decision analytics to support our defense and intel customers’ mission to defend against evolving threats around the world.

**Your greatest work is ahead!**

The National Security Sector (NSS) seeks a highly qualified and trained Journeyman-level Media Malware Analysts to support United States Cyber Command (USCYBERCOM) operations by identifying and analyzing sophisticated malware threats targeting USCYBERCOM the Department of Defense Information Network (DODIN), and associated networks and organizations. This vital on-site support to USCYBERCOM J3 (Operations), Cyber National Mission Force (CNMF), and Joint Task Force-Ares (JTF-ARES) underpins USCYBERCOM support to United States National Security objectives. This opportunity is in anticipation of a future contract award!

**What you’ll be doing:**

+ Provide timely, accurate, relevant support in manner that best supports USCYBERCOM in identifying and assessing emerging threats and vulnerabilities in the Cyberspace domain.

+ Conduct forensic analysis of vulnerable or compromised systems and media and identify and analyze adversary TTPs and intrusion artifacts.

+ Perform static and dynamic malware analysis, including reverse engineering and extracting malicious files from digital media and conduct detailed file analysis, as appropriate.

+ Create technical analysis reports with actionable intelligence findings, delivering timely, accurate, relevant threat briefs and analysis updates that meet explicit and implied requirements, and deliver presentations to leadership in appropriate formats.

+ Identify unique indicators for signature and heuristic development.

+ Draft and support implementation of security incident response policies.

+ Analyze operational reporting to correlate attack trends and shared tradecraft and support development and improvement of enterprise malware analysis tools.

+ Conduct log/system analysis (routers, Windows, UNIX) for threat detection and update DoD situational awareness mechanisms (e.g., USCYBERCOM portals).

+ Research open-source intel to inform threat assessments and signature creation.

+ Develop and maintain validated MD5 hash lists for signature repositories

+ Analyze and evaluate All-Source finished intelligence, single-source intelligence, and technical data from various sources to identify Cyber threat patterns and anomalies.

+ Conduct and publish in-depth risk assessments to evaluate and categorize the risk posture of detected cyber threats while supporting development and refinement of risk assessment methodologies and tools used for threat categorization.

+ Collaborate with operational, technical, and intelligence elements across USCYBERCOM to enhance situational awareness and threat response capabilities.

+ Maintain a current understanding of advanced persistent threats (APTs), threat actor tactics, techniques, and procedures (TTPs), and cyber threat trends affecting national security.

+ Maintain situational awareness of, and execute on demand, CO crisis plans.

+ Provide situational awareness to range of projects, Crisis Action Teams, and current operations activities supporting Operational Planning Teams (OPTs)

+ Execute resource allocation decisions aligned with organization objectives.

+ Apply knowledge of cyber threats and attack methods and techniques emanating from state and non-state adversaries and tiered vulnerabilities within Blue Space as focus of threats.

+ Review, approve, prioritize, and submit operational requirements for research, development, and/or acquisition of Cyber capabilities

+ Interpret and apply laws, regulations, policies, and guidance relevant to daily activities

+ Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.

**What does Leidos need from me?**

+ Active Top Secret clearance with SCI eligibility and Polygraph required.

+ BA/BS degree or higher within Computer Science, Cybersecurity, Software Engineering, Digital Forensics, or related field, or ability to complete degree within one year of hire. Can substitute formal education with extended experience and technical certifications.

+ Eight plus years’ demonstrated proficiency in malware analysis (static/dynamic), incident handling, and reverse engineering.

+ Working experience with tools such as IDA Pro, Ghidra, Wireshark, Volatility, and sandbox environments.

+ Intimate familiarity with network protocols, OS internals (Windows/Linux/UNIX), and cyber threat analysis

+ Broad knowledge of Blue-space Cyber capabilities and demonstrate understanding of available Cyber infrastructure or platforms to conduct Defensive (DCO) and Offensive Cyberspace Operations (OCO)

+ Knowledge of computer networking fundamentals as well as concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).

+ Ability to support timely, accurate, relevant analytical production, to include documents, summaries, issue papers, talking points, and briefings.

+ Demonstrated proficiency working in a fast-paced collaborative environment, ability to proactively multi-task and meet short deadlines.

+ Strong interpersonal, critical thinking, and communication skills, including the ability to clearly convey complex and technical data to nontechnical consumers.

**Favorable if you have:**

+ Masters’ Degree or higher within Cybersecurity, Information Security, or related fields.

+ Experience developing detection signatures and writing technical reports for leadership.

+ Deep understanding of USCYBERCOM organizational structure and mission.

+ Prior experience supporting Joint operations across multiple warfighting domains.

+ Demonstrated experience incorporating Artificial Intelligence and Machine Learning into operations at any level to increase efficiency and effectiveness of operational outcomes

+ Experience with Space-enabled CO.

+ Formal training within field of Cyber Warfare and Joint Operations.

+ Familiar with art of Data Science and applicability to CO.

+ Familiar with Microsoft Power BI data visualization software.

+ Desired Certifications (not all inclusive, no expectations for candidate to hold all certifications): GIAC Reverse Engineering Malware (GREM); Certified Reverse Engineering Analyst (CREA); Certified Malware Analyst (CMA); Digital Forensics and Incident Response (DFIR); GIAC Certified Forensic Analyst (GCFA); GIAC Cyber Threat Intelligence (GCTI).

**Original Posting:**

June 11, 2025

For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

**Pay Range:**

Pay Range $104,650.00 - $189,175.00

The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

REQNUMBER: R-00160787

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.