ClearanceJobs
Senior Malware Engineer
Leidos has a current job opportunity for a Senior Malware Engineer on the DISA GSM-O program in Alexandria, VA. An active Top Secret security clearance and demonstrated advanced technical ability in reverse engineering custom protocols used by malware. This position provides support to the J6 Pentagon Security Operations Center in conduct reverse engineering for Malware Analysis using dynamic and/or static analysis. Activities that this position performs include developing a standard process for the capturing and analysis of software artifacts suspected of being malicious code. This analysis will uncover an adversaries' tools, techniques, procedures, and will aid in discovering other affected or vulnerable systems, establishing a more concrete framework for attribution, and drive the development of additional defensive measures. The tasks will culminate with written reports written in plain business language that details the analysis of the malware and detail the defensive measures that can be employed to discover other vulnerable systems and implement defensive measures to prevent future risks. Responsibilities include: Demonstrated advanced experience with network traffic and communications, including known ports and services; Demonstrated advanced experience with the Windows operating system and other operating systems (e.g., Linux or Unix); Demonstrated experience with cyber security related technologies (e.g., NIDS, HIDS, IPS, and IDS); Demonstrated advanced understanding of various open source and commercial analysis tools used for malware analysis and reverse engineering; Demonstrated advanced technical ability in reverse engineering custom protocols used by malware; Demonstrated experience with programming languages (e.g., Python, C, C++, Ruby) Basic Qualifications: Active Top Secret clearance or higher (program can support up to TS/SCI) Current DoD 8570 IAT II and GREM certifications required. We are unable to consider applicants without GREM certification at this time. Bachelor's degree and 12+ years of prior IT. Additional work experience or Cyber courses/certifications may be substituted in lieu of degree. Demonstrated experience with reverse engineering practices Strong analytical and troubleshooting skills. Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings. Preferred Qualifications: IAM-III certification ITIL v3 Foundation or v4 BA/BS degree in Computer Science, Information Assurance, or Information Systems Cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization. Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). Experience with malware analysis concepts and methods. Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework. About our Program: Through the J6 Penetration Handling, Incident, System Health (PHISH) support services task order on the GSM-O contract, we provide IT products, services and solutions to the Pentagon and other DoD offices and agencies for them to meet mission and business requirements. Our Cybersecurity team performs cyber defensive actions in support of J6 to prevent, detect, respond and recover from adversarial activities. At Leidos, we don't want someone who "fits the mold"we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, "what's next?" before the dust settles on "what's now." If you're already scheming step 20 while everyone else is still debating step 2 good. You'll fit right in.
Leidos has a current job opportunity for a Senior Malware Engineer on the DISA GSM-O program in Alexandria, VA. An active Top Secret security clearance and demonstrated advanced technical ability in reverse engineering custom protocols used by malware. This position provides support to the J6 Pentagon Security Operations Center in conduct reverse engineering for Malware Analysis using dynamic and/or static analysis. Activities that this position performs include developing a standard process for the capturing and analysis of software artifacts suspected of being malicious code. This analysis will uncover an adversaries' tools, techniques, procedures, and will aid in discovering other affected or vulnerable systems, establishing a more concrete framework for attribution, and drive the development of additional defensive measures. The tasks will culminate with written reports written in plain business language that details the analysis of the malware and detail the defensive measures that can be employed to discover other vulnerable systems and implement defensive measures to prevent future risks. Responsibilities include: Demonstrated advanced experience with network traffic and communications, including known ports and services; Demonstrated advanced experience with the Windows operating system and other operating systems (e.g., Linux or Unix); Demonstrated experience with cyber security related technologies (e.g., NIDS, HIDS, IPS, and IDS); Demonstrated advanced understanding of various open source and commercial analysis tools used for malware analysis and reverse engineering; Demonstrated advanced technical ability in reverse engineering custom protocols used by malware; Demonstrated experience with programming languages (e.g., Python, C, C++, Ruby) Basic Qualifications: Active Top Secret clearance or higher (program can support up to TS/SCI) Current DoD 8570 IAT II and GREM certifications required. We are unable to consider applicants without GREM certification at this time. Bachelor's degree and 12+ years of prior IT. Additional work experience or Cyber courses/certifications may be substituted in lieu of degree. Demonstrated experience with reverse engineering practices Strong analytical and troubleshooting skills. Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings. Preferred Qualifications: IAM-III certification ITIL v3 Foundation or v4 BA/BS degree in Computer Science, Information Assurance, or Information Systems Cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization. Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs). Experience with malware analysis concepts and methods. Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework. About our Program: Through the J6 Penetration Handling, Incident, System Health (PHISH) support services task order on the GSM-O contract, we provide IT products, services and solutions to the Pentagon and other DoD offices and agencies for them to meet mission and business requirements. Our Cybersecurity team performs cyber defensive actions in support of J6 to prevent, detect, respond and recover from adversarial activities. At Leidos, we don't want someone who "fits the mold"we want someone who melts it down and builds something better. This is a role for the restless, the over-caffeinated, the ones who ask, "what's next?" before the dust settles on "what's now." If you're already scheming step 20 while everyone else is still debating step 2 good. You'll fit right in.