Lead Malware Analyst
Leidos - Alexandria, Virginia, us, 22350
Work at Leidos
Overview
- View job
Overview
Lead Malware Analyst
to join our team. This opportunity allows you to contribute significantly to our mission by leveraging your expertise in reverse engineering and malware analysis. Candidates must possess an active Top Secret security clearance and a proven aptitude for reverse engineering custom protocols used by malicious software. This role involves providing essential support to the J6 Pentagon Security Operations Center, performing both dynamic and static analysis to reverse engineer malware. You will develop standardized processes for capturing and analyzing potentially malicious software artifacts, which are critical for uncovering adversaries' tools, techniques, and procedures. This work aids in discovering affected systems, enhances attribution frameworks, and facilitates the creation of advanced defensive measures. Your work will culminate in comprehensive reports written in clear business language, detailing malware analysis and recommending strategies for identifying other vulnerable systems, as well as implementing protective measures to mitigate future risks. Responsibilities Include: Extensive experience with network traffic and communications, including knowledge of associated ports and services. Proficient in the Windows operating system and familiarity with other systems (e.g., Linux or Unix). Experience with cybersecurity technologies such as NIDS, HIDS, IPS, and IDS. Thorough understanding of both open-source and commercial tools used in malware analysis and reverse engineering. Advanced skills in reverse engineering custom protocols utilized by malware. Familiarity with programming languages, including Python, C, C++, and Ruby. Basic Qualifications: Bachelor's degree with 12+ years of relevant IT experience; additional work experience or Cyber certifications may substitute for degree. Active Top Secret clearance or higher (support for TS/SCI available). DoD 8570 IAT II and GREM certifications required before starting. Proven experience in reverse engineering practices. Strong analytical and troubleshooting skills. Self-motivated with excellent written and verbal communication skills, capable of creating complex technical reports on analytical findings. Preferred Qualifications: IAM-III certification. ITIL v3 Foundation or v4 certification. BA/BS in Computer Science, Information Assurance, or Information Systems. Experience in cybersecurity roles related to Protect, Detect, Respond, and Sustain within a Computer Incident Response organization. Understanding of the lifecycle of cybersecurity threats, including attack vectors and exploitation methods, alongside intrusion set tactics, techniques, and procedures (TTPs). Knowledge of malware analysis concepts and methodologies. Familiarity with Intelligence Driven Defense, Cyber Kill Chain methodology, and MITRE ATT&CK framework. About our Program: Through the J6 Penetration Handling, Incident, System Health (PHISH) support services task order under the GSM-O contract, we deliver IT products, services, and solutions to the Pentagon and various DoD offices and agencies, meeting crucial mission and business requirements. Our Cybersecurity team is dedicated to conducting cyber defensive actions in support of J6 to proactively prevent, detect, respond to, and recover from adversarial activities. Original Posting: July 7, 2025 Pay Range: Pay Range $126,100.00 - $227,950.00 The Leidos pay range for this job level is a general guideline only and does not guarantee compensation or salary. Various factors considered in extending an offer include responsibilities of the job, education, experience, skills, and internal equity, alongside market data and applicable laws.