Malware Analysis Jobs

1 to 25 of 45 Malware Analysis Jobs

Cyber Intrusion Analyst

Pearl Harbor, Hawaii, United States
Leidos
Pearl Harbor, Hawaii. JOB DESCRIPTION: Work closely with Government counterparts to provide guidance within the CND-SP area. Provide CND reports, trends, responses, mitigations, analysis & information dissemination. Provide C2 support, situational awareness support, and provide leadership & support for all CND applicable activities within Protect, Detect, Respond, and Sustain. Work … Team, responsible for maintaining the integrity & security of enterprise-wide systems & networks. Provide technical leadership to CND Teams supporting security initiatives through predictive & reactive analysis, and by articulating emerging trends to leadership & staff. PRIMARY RESPONSIBILITIES: Maintain integrity and security of enterprise-wide cyber systems and networks. Coordinate resources during … enterprise incident response efforts. Employ advanced forensic tools and techniques for attack reconstruction. Perform network traffic analysis utilizing raw packet data, net flow, IDS, IPS and custom sensor output, as it pertains to the cyber security of communications networks. Review threat data and develop custom signatures for Open Source more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Threat Intelligence Support Analyst

Edinburgh, Scotland, United Kingdom
Workday
an emphasis on customer satisfaction; assess and escalate to the next level as needed Knowledge, Skills and Abilities - Understanding and experience with the intelligence analysis lifecycle, including but not limited to: Conducting all-source intelligence research Mining internal and external databases/repositories Pivoting research focus on TI indicators … following areas: Familiarity with advanced search engine functionality and search query customization. Unix, Linux, Windows, and OSX operating systems Exploits, vulnerabilities, intrusion vectors, and malware Host forensics, network forensics, and malware analysis techniques Network traffic analysis, endpoint activity analysis, and log analysis techniques Understanding … in a fast-paced, dynamic environment - Passionate about information security and service excellence Desired Experience/Training: Professional degree relevant to cybersecurity or intelligence analysis or equivalent work experience within a technical information security-related role such as Security Operations, Incident Response, or Threat Intelligence analysis Relevant governmental more »
Posted:

Cyber Countermeasures Engineer

Ashburn, Virginia, United States
Leidos
supporting U.S. Customs and Border Protection (CBP), you will play a crucial role in defending against cyber threats and will perform in-depth technical analysis of network and endpoint logs & activity , direct and track enterprise countermeasure actions, implement countermeasures across a broad spectrum of network and host based tools … networks to detect advanced threats and escalate as necessary, or recommend countermeasures for implementation . Analyze host, network, and application logs in addition to malware and code. Will be responsible for developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB … network, and cloud based technologies/tools. Basic Qualifications: Possess a minimum of four (4 ) years of professional experience in incident detection and response, malware analysis, or cyber forensics . Have a b achelor's degree in Computer Science , Engineering, Information Technology, Cybersecurity, or related field with three more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Tier 2 Incident Response Analyst

Ashburn, Virginia, United States
Leidos
Leidos is seeking an experienced Incident Response Analyst to support this highly visible cyber security operations center (SOC) for Customs Border Protection (CBP), cyber analysis, application development, and a 24x7x365 support staff. Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a US … and netflow analysis. - Security+ Certification or equivalent in industry certification, background and knowledge. - Knowledge of TCP/UDP/IP networking, familiarity with packet analysis tools such as WireShark , and a general understanding of networking protocols similar to COMPTIA Network+ Basic Qualifications: Bachelor's Degree and 4-8 years … of experience be in the areas of incident detection and response, remediation malware analysis, or computer forensics. Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics. Additional certs may be considered in place of a degree. Clearance more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Fusion and Threats Analyst

Scott Air Force Base, Illinois, United States
Leidos
Combatant Commands (CoCOMs). PRIMARY RESPONSIBILITIES: Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open source reporting for new vulnerabilities, malware or other threats that have the potential to impact the DoDIN. Support mission-critical Continuity of Operations (COOP). Synthesize, summarize, consolidate and share … reports, wiki updates, collaboration/chat tippers and notifications, DoD incident handling database queries, metrics, and trend reports. Assist in providing threat and vulnerability analysis as well as security advisory services and recommendations. Train and mentor other team members. BASIC QUALIFICATIONS: Active TS/SCI clearance Bachelor's degree … defense-in-depth. PREFERRED QUALIFICATIONS: Knowledgeable in Cloud security/defense. Experience with DISA and DoD Networks. Working knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cyber-crime. Advanced Certifications such as SANS GIAC/GCIA more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Intelligence Analyst

Scott Air Force Base, Illinois, United States
Leidos
Combatant Commands (CoCOMs). PRIMARY RESPONSIBILITIES: Maintain situational awareness of cyber activity by reviewing DoD, Intelligence Community and open source reporting for new vulnerabilities, malware or other threats that have the potential to impact the DoDIN. Support mission-critical Continuity of Operations (COOP). Synthesize, summarize, consolidate and share … reports, wiki updates, collaboration/chat tippers and notifications, DoD incident handling database queries, metrics, and trend reports. Assist in providing threat and vulnerability analysis as well as security advisory services and recommendations. Train and mentor other team members. BASIC QUALIFICATIONS: Active TS/SCI clearance Bachelor's degree … defense-in-depth. PREFERRED QUALIFICATIONS: Knowledgeable in Cloud security/defense. Experience with DISA and DoD Networks. Working knowledge of cyber operational security, log analysis, netflow analysis, incident response, malware analysis, computer forensics, and/or cyber-crime. Advanced Certifications such as SANS GIAC/GCIA more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Incident Response Analyst

Ashburn, Virginia, United States
Leidos
Response Analyst to join our team on a highly visible cyber security single-award IDIQ vehicle that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff. Our Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze … are achieved through a shared incident tracking system and other means of coordination and communication. Primary Responsibilities Lead and mentor a team of cybersecurity analysis, fostering a collaborative and high-performance culture. Provide expert analysis investigative support of large scale and complex security incidents, and in many cases … Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies Instill and reinforce industry best practices in the domains of incident response, cybersecurity analysis, case and knowledge management, and SOC operations Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Fusion & Threat Analyst

Tampa, Florida, United States
Leidos
the Defense Information Systems Agency (DISA) in support of the DOD and COCOMs. In this role, you will provide support with cyber threat intelligence analysis, incident handling, triage of events, threat detection, trend analysis, metric development, vulnerability information dissemination and conduct network traffic analysis using raw packet … data) to identify cyber adversary activity. Identify threats to the enterprise and provide mitigation strategies to improve security, and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious … rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics more »
Employment Type: Permanent
Salary: USD Annual
Posted:

DFIR Consultant

England, United Kingdom
NCC Group
the Digital Forensics and Incident Response space The DFIR Consultant plays a vital role within the team of seasoned analysts, actively participating in the analysis, and response to security incidents and events. With a focus on continuous learning and collaboration the Seniors are adaptable to most events in challenging … and dynamic situations. Through the application of foundational technical skills and a strong dedication to detail-oriented analysis the Senior DFIR Consultant plays a key role supporting clients. Key Accountabilities Collaborating with peers and completion of assigned projects Maintaining high standards of delivery Ability to analyze and interpret situations … to consult in high pressure situations Supporting Sales when required Functional and technical skills Minimum Requirements Strong technical knowledge, including the ability to conduct analysis in support of cyber incident response activities (to include an understanding of network analysis, host investigation including forensics, malware analysis). more »
Posted:

Cyber Threat Hunter

Ashburn, Virginia, United States
Leidos
verify threat hypotheses Proactively and iteratively search through systems and networks to detect advanced threats Analyze host, network, and application logs in addition to malware and code Prepare and report risk analysis and threat findings to appropriate stakeholders Create, recommend, and assist with development of new security content … bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS 8-12 years of experience in incident detection and response, malware analysis, and/or cyber forensics. The candidate must possess an active Top Secret Clearance. In addition to clearance requirement, all DHS personnel … one of the following certifications: CASP+ CE, CCNP-Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP Preferred Qualifications Expertise in network and host-based analysis and investigation Demonstrated experience planning and executing threat hunt missions Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers Working more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Threat Intelligence Analyst

Bluemont, Virginia, United States
Leidos
years in incident detection and response and/or cyber intelligence analysis. Maintain and drive the development of new reports of Cyber Threat Intelligence analysis to peers, management, and customer teams for purposes of situational awareness and making threat intelligence actionable. Provide support to security operations during incident response … and threat hunting activities that includes cyber threat analysis support, research, recommending relevant remediation and mitigation. Conduct trending and correlation of various cyber intelligence sources for the purposes of indicator collection, shifts in TTPs, attribution and establishing countermeasures to increase cyber resiliency. Deep understanding of Cyber Kill Chain and … Knowledge of Structured Analytic Techniques Host-based and network-based forensics related to the identification of advanced cyber threat activities, intrusion detection, incident response, malware analysis, and security content development (e.g., signatures, rules etc.); and cyber threat intelligence. Proficiency in one more of the following computer languages Python more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Specialist

England, United Kingdom
Taleo BE
customer centric solution for the UK Intelligence customer group, comprising of both offensive and defensive cyber activities, including: anomaly detection and insider threat detection, malware analysis, reverse engineering, threat intelligence, decoys and deception, application of AI/ML techniques, orchestration and automation, and penetration testing across a variety more »
Posted:

SecOps Specialist

London, United Kingdom
La Fosse Associates Ltd
mature a SOC functionality in terms of people, processes and tooling. Essential: Demosntrable experience & understanding of security fundamentals including network and host forensics, log analysis and basic malware analysis 5+ years SOC experience Exentesive experince with the full MS security suite, specifically sentinel Understand the basics of more »
Employment Type: Contract
Rate: £750 - £800 per day
Posted:

IT Cyber Security Manager

Surrey, United Kingdom
Hybrid / WFH Options
Gold Group
point on monitoring of corporate environment to identify security issues or incidents (Threat Hunting) Manage and mentor the security analyst, (monitoring, Investigation, root cause analysis of Security alerts from multiple information sources. Including, but not limited to Darktrace, LogPoint, WithSecure, Mimecast, while ensuring the team stays relevant to the … analyse escalated security matters, identify methods and solutions in response to security related queries including the ones, submitted by end users. Perform root cause analysis of security incidents and participate in post-incident reviews to provide practical recommendations for improving the organisation's threat detection and incident response capabilities … and overall security posture Perform malware analysis and digital forensics where appropriate Drive internal phishing campaigns (KnowBe4 platform) and work with management and HR - Training to raise Cyber awareness within the corporate environment, (new hire inductions, periodic training, etc) Own maintenance, renewal and distribution of SSL Certificates Manage more »
Employment Type: Permanent
Salary: £80000 - £500000/annum + Benefits
Posted:

Senior Principal Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
depth security assessments across a variety of products and services. Your next project could be anything from a secure systems design, static and dynamic analysis of a multi-node microservice infrastructure, to writing a fuzzer for an undocumented network protocol or the grammar of a new programming language, or … analysis and reverse engineering of firmware used in the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing … years industry experience in software development Ability to perform manual source code reviews in one of the aforementioned languages, or assisted review with code analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerability more »
Posted:

IT Security Operations Coordinator

Singapore
Hybrid / WFH Options
Owen Daniels Consultancy
Professional certifications in information security (e.g., ISACA, BCS, CIPP, ITIL, ISC2). Experience with scripting and programming languages. Expertise in threat hunting methodologies and malware analysis. If you feel like this is a good match for your skill set and experience, please apply to the role for an initial more »
Employment Type: Permanent
Posted:

Senior Cyber Security Fusion Watch Officer

Maryland, United States
Leidos
provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support JFHQ-DODIN Operations Center, providing command, control … of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious … rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Fusion Watch Officer

Hanover, Maryland, United States
Leidos
provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support JFHQ-DODIN Operations Center, providing command, control … of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious … rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Fusion Watch Officer

Odenton, Maryland, United States
Leidos
provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support JFHQ-DODIN Operations Center, providing command, control … of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious … rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Fusion Watch Officer

Riverdale, Maryland, United States
Leidos
provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support JFHQ-DODIN Operations Center, providing command, control … of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious … rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Fusion Watch Officer

Laurel, Maryland, United States
Leidos
provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support JFHQ-DODIN Operations Center, providing command, control … of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious … rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Fusion Watch Officer

Severn, Maryland, United States
Leidos
provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support JFHQ-DODIN Operations Center, providing command, control … of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious … rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Fusion Watch Officer

Catonsville, Maryland, United States
Leidos
provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support JFHQ-DODIN Operations Center, providing command, control … of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious … rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Fusion Watch Officer

Fulton, Maryland, United States
Leidos
provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support JFHQ-DODIN Operations Center, providing command, control … of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious … rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Security Fusion Watch Officer

Burtonsville, Maryland, United States
Leidos
provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD. The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support JFHQ-DODIN Operations Center, providing command, control … of defense instruction, guidance, and policy. Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface. Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed. Analyze and document malicious … rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations. Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities. Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN. Collect analysis metrics more »
Employment Type: Permanent
Salary: USD Annual
Posted:
Malware Analysis
10th Percentile
£53,750
25th Percentile
£57,500
Median
£75,000
75th Percentile
£82,500