Responsibilities include, but are not limited to:
• Leads and participates in the evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers
• Responsible for providing findings in a technical report with details of the malware, identification parameters, advanced capabilities, and mitigation strategies
• Conducts research in the area of malicious software, vulnerabilities, and exploitation tactics
• Requires experience with application security, network security, reverse engineering, or malware
• Requires strong knowledge of worms, viruses, Trojans, rootkits, botnets, Windows internals, and the Win32 API
• Extensive experience required in programming (assembly and web) and system analysis with various tools, including IDA Pro, Ollydbg, PCAP tools, or TCP Dump
Basic Qualifications:
• Active Top-Secret/SCI
• Minimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhD
• GIAC Certified Forensic Analyst (GCFA)
• Possess DoD 8570.01-M Information Assurance Technician (IAT) Level II Baseline Certification
• Must posses an active, OR have the ability to obtain within 90 days of hire date, an ITIL Foundations Certification
• Must have a full, complete, and in-depth understanding of all aspects of Defensive Cyber Operations
#FortHuachuca
Target Salary Range: $146,000 - $234,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual’s experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
...devices like Windows laptops, Apple iPhones, and Microsoft 365... ..., repaired, and retired. The work hours are 9:00am to 5:00pm, Monday... ...is essential. Exceptional customer service skills, including strong... ...independently, including in a work-from-home environment. Property...
...Summary This position involves supervising a team within FEMA's Region 8 recovery team, focusing on Fire Management Assistance and Public Assistance disaster post award and closeout. The ideal candidate will have experience supervising employees to achieve organizational...
Job Description We are seeking a highly skilled and experienced Investment Banking Associate to join our dynamic Natural Resources team, offering an exceptional opportunity to contribute to high-profile transactions and drive growth within a leading financial institution...
...databases, and library equipment. LIBRARY SUPPORT SERVICES: Records of daily library statistics and gate counts. Collaborate in... ...databases, and catalog to facilitate access to information resources. Manage the movement of library materials, including lifting and...
...Consulting is a design-led, software development and hardware engineering company, offering end-to-end digital services to help companies... ...to all jobs - or visit freshconsulting.com/careers Title: Robotics Navigation Engineer Duration: 6 months with possible...