Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Crimson
and manage competing demands. * Experience in analyzing IT logs and event sources is preferred. * Monitor and administer Security Information and Event Management (SIEM). * Malwareanalysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Familiarity with data storage systems … backup solutions, and restoration methods. * Understanding of security tools, their functions, and applications, including Anti-Malware, IPS, Web and Email Gateways, security analysis tools, web security tools, and next-generation firewalls/UTMs. * Expertise in computer forensics, cybersecurity laws and regulations, operating systems, and intelligence gathering and sharing … and manage competing demands. * Experience in analyzing IT logs and event sources is preferred. * Monitor and administer Security Information and Event Management (SIEM). * Malwareanalysis and forensics research. * Understanding/differentiation of intrusion attempts and false positives. * Investigation tracking and threat resolution. * Familiarity with data storage systems More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
technologies, including Splunk, Microsoft Sentinel, or Elastic Experience with forensics tools, including Magnet Axiom and FTK Experience performing forensic imaging, remote collection, and forensic analysis Experience with malwareanalysis, including static, dynamic, and reverse engineering Experience performing root cause analysis and following through with all phases … of the incident response lifecycle Top Secret clearance Bachelor's degree Additional Qualifications Experience acquiring memory from the host and performing memory analysis with tools, including Volatility Experience with Endpoint Detection and Response (EDR) tools, including CrowdStrike Falcon and FireEye HX Experience performing analysis of packet capture using More ❯
Quantico, Virginia, United States Hybrid / WFH Options
ICS Nett, Inc
X-Ways Forensics, Autopsy, Sleuth Kit • Experience with Wireless detection systems such as Yorkie-Pro • Experience with performing forensic imaging, remote collection, and forensic analysis • Experience with malwareanalysis, including static, dynamic, and reverse engineering • Experience with SIEM technologies, including Splunk, or Elastic • Experience with performing root … cause analysis and following through with all phases of the incident response lifecycle YEARS EXPERIENCE: At least five (5) years of experience in cyber forensic investigations. EDUCATION REQUIREMENTS: Bachelor's Degree, or equivalent experience in Cybersecurity, and/or Information Systems Management, Information Technology More ❯
Alexandria, Virginia, United States Hybrid / WFH Options
Agile Defense, Inc
USPTO), Cybersecurity Division, has a requirement to support a Cyber Threat Intelligence (CTI) capability within USPTO. This support includes monitoring activities, developing cyber threat analysis, identifying mitigation and remediation courses of action, sharing actionable cyber threat intelligence used in organizational IT asset protection, trending strategic cyber threats and situational … awareness. A successful candidate will enable our government operational counterparts to promote the rapid analysis of national level cyber threats and incidents. The hours for the position are Monday through Friday core hours but the ideal candidate will provide technical support on-call to a 24x7 cyber program in … cyber threat data gathered including the following and related cyber threat data present and emerging adversarial tactics, techniques, and procedures through independent research and analysis of identified activity combined with current SOC operations. • Analyze unclassified and classified sources of information and cyber threat intelligence on foreign and domestic cyber More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
OFWAT
experience and expertise in one or more of the following: SIEM systems preferably Microsoft Sentinel, network and systems security, intrusion detection/prevention, and malware analysis. Professional Qualifications: At least one professional qualification such as CISSP, CISM, SANS, or equivalent. Strong analytical skills, with the ability to correlate and More ❯
level of proficiency in Python and query languages such as SQL. Experience analyzing attack behavior and prototyping high-quality detections. Experience with threat intelligence, malwareanalysis, infrastructure as code, detection engineering, or forensics. Experience contributing to a high growth startup environment. Deadline to apply: None. Applications will be More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Cipher Tech Solutions
Experience in computer engineering or a related field with in-depth knowledge of software reverse engineering and/or software development. Experience using static analysis tools such as IDA Pro and dynamic analysis tools including debuggers (this can include academic experience) Proficiency in development for IDA Pro Experience … SANS certification One of the following certifications: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, SSCP, CASP CE, CCNP Security, CISA, GCED, GCIH. Experience with malwareanalysis Benefits: Mission focused work environment Subsidized medical/dental/vision insurance HSA contributions 401k matching Holiday and Paid Time Off (PTO … of our company is comprised of extremely talented software developers who write production tools which directly support one of two missions: digital forensics and malware reverse engineering. Digital forensics is the practice of extracting and processing evidence from computers, phones, tablets, cameras, flash-drives, and just about any other More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Leidos
R- Description This position is a hybrid position designed to bridge SOC Analysis with Splunk Engineering and Content Creation. The candidate should have competency with administering Splunk, creating custom content with SPL, data administration in a SIEM, and performing security investigations through Splunk ES. The mid-tier candidate will … dashboards and notables. Additionally, the ideal candidate would be familiar with tools commonly deployed in a SOC environment such as intrusion detection systems, intrusion analysis systems, security information event management platforms (SIEM), endpoint threat detection tools, and security operations ticket management. REQUIRED Qualifications: • Must be a U.S. Citizen. • Ability … network defense environments. • Splunk Admin Certification • Strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis. • Prior experience and ability with analyzing information technology security events to discern More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
SRC
Required: -Experience with Ghidra, IDA Pro, or similar -Experience with C/C++, Python, or Assembly -Experience common binary formats -Experience with CNO development, malwareanalysis, or Windows internals -Experience with Wireshark or similar The work is located in Annapolis Junction, MD and requires a TS/SCI More ❯
Bethesda, Maryland, United States Hybrid / WFH Options
Leidos
adaptive team that values innovation, collaboration, and professional development. Your job will be to conduct Mobile Software Reverse Engineering (with support to development and malwareanalysis efforts). While most work is conducted on-site at our client location in Bethesda, MD, we offer a flexible schedule and … at memory/register level in support of technical exploitation operations. Support efforts to design, prototype, document, test, conduct exploitation automation and transition code analysis methods and tools specific to technical exploitation operations. You demonstrate clear devotion to the software engineering best practices and meet the following qualifications (required … operating system & architecture. Experience in computer or cell phone architecture, system internals, operating systems, and/or boot process software engineering. Experience with static analysis tools such as IDA Pro, Ghidra and Binary Ninja. Experience with debugging tools such as WinDbg. Experience with virtualization, sandboxing, and emulation tools like More ❯