Description:
Support clients in solving difficult problems by providing recommendations based on the results of malicious code analysis. Analyze and evaluate malicious code to create technical reports for indicators of compromise and to recommend mitigation and detection actions. Work to continually improve current malware analysis techniques and identify new ways to improve malware identification best practices. Conduct research and training on comprehending emerging malicious code threats.
Qualifications:
- Five (5) years of demonstrated experience in cybersecurity
- Three (3) years of demonstrated experience with malware analysis
- Two (2) years of demonstrated experience with tools such as GHIDRA, SYSInternals, FireEye AX, or similar technologies.
- One (1) year of demonstrated experience with development of code in languages such as Python, Lua, C/C++, Ruby or similar
- Requires DoD 8570 compliance with CSSP Analyst baseline certification, Information Assurance Technical (IAT) Level I or Level II certification, and Computing Environment (CE) certification. The CE certification requirements can be fulfilled with either Microsoft OS, Cent OS/Red Hat OS CE certifications.
- Requires Global Information Assurances Certification (GIAC) Certified Forensic Analyst (GCFA) certificate or Certified Reverse Engineering Malware (GREM) certificate.
- Requires successful completion of the Splunk software training course “Fundamentals 1”.