Sr. Forensic Malware Analyst

BBNCALLJOBSROLLUP
San Antonio, TX Full Time
POSTED ON 4/12/2024
STS Systems Support, LLC (SSS) is seeking a Sr. Forensic Malware Analyst Requirements: DoDD 8570.01‐M/8140.01 I AT Level III CND Active TS/SCI More than five (5) years of experience as a Forensic Malware Technician. Experience performing forensic acquisition and examination of Windows, Unix/Linux, and Macintosh‐based computers and servers. Strong skill in and a strong understanding of: the use of a variety of forensic tools (Access Data, FTK, Guidance EnCase; including mobility (Axiom/BlackBag , Mobilyze/Cellebrite/Paraben and in, FTK, X‐Ways Forensics, FireEye, Volatility, Sleuthkit, BlackBag tools) and various Open Source forensic tools. Shell Scripting is a plus. Experience writing intelligence and technical articles for production and dissemination. Very proficient w/ malware analysis, sandboxing, and software reverse engineering. Proficient Experience with scripting languages such as Python and PowerShell. Extensive knowledge of MITRE ATT&CK framework, and its uses within the cybersecurity community (e.g., Open Source projects). Required: SANS GCFA (or equivalent). Desired: GREM, GCTI and/or ACE   Duties: Document all findings in the investigation/incident log. (CDRL A008) Track evidence inventory for intake and releasing to the forensics laboratory. This includes insuring proper handling and maintenance of evidence and chain of custody records with no more than 5% error rate. Utilize forensic tools such as, but not limited to; EnCase, FTK, FireEye, etc. and other systems as required. Conduct analysis of metadata and forensic examinations of digital media from a variety of sources including preservation, acquisition, and analysis of digital evidence with the goal of developing forensically sound evidence. Confirm malicious activity when new information is identified through forensic analysis. Investigate network and computer intrusions to identify root cause and generate indicators of compromise and document all findings in the investigation/incident log for each file. Perform memory forensics and malware reverse engineering of suspected malicious files to verify if system compromise occurred document all findings Indicators of Compromise (IOCs) in the investigation/incident log for each file. Perform Hard Drive Analysis of suspected/confirmed infected or exploited systems and document all findings in the investigation/incident log for each hard drive with no more than a 5% error rate. Develop methods to identify, contain, log, and analyze malware‐based activities on AF AIS and networks. (A008) Provide support to AF network administrators on the installation and analysis of packet sniffers on their network topology by reporting the functionality status upon request. Generate forensic reports and synopses presenting complex technical processes and findings clearly and concisely to technical and non‐technical. (CDRL A008) Collaborate with leadership and external agencies, including Counter‐Intelligence activities/agencies, OSI, FBI, and other security agencies, to include Incident Responders, as well as other forensic analysts. Provide AF OSI DCO technical support to law enforcement and counter‐ intelligence activities. Turn any investigation over to AF OSI if it is determined during the course of an investigation a law was broken. Support and/or augment Incident Response deployment with same day notice. This travel will allow responders to retrieve hard drives or miscellaneous storage media, isolate system(s) for additional investigation, and perform other on‐site Incident Response actions. Set up a monitor or “cage” at the on‐site location as needed. Provide OJT to other contractor employees, military, and/or civilian personnel, and ensure continuity folders/working aids are updated at least once per quarter in order to ensure efficient transition when personnel rotate. Provide requested forensic information to operational flight commander as it relates to the Host Detection processes and procedures.

Salary.com Estimation for Sr. Forensic Malware Analyst in San Antonio, TX
$94,419 to $122,952
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

Sign up to receive alerts about other jobs with skills like those required for the Sr. Forensic Malware Analyst.

Click the checkbox next to the jobs that you are interested in.

  • Business Requirement Gathering Skill

    • Income Estimation: $126,719 - $161,641
    • Income Estimation: $135,855 - $173,192
  • Cloud Security Skill

    • Income Estimation: $158,580 - $201,978
    • Income Estimation: $172,879 - $221,087
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at BBNCALLJOBSROLLUP

BBNCALLJOBSROLLUP
Hired Organization Address Aleknagik, AK Full Time
This Recruiter role will support the Shareholder Development Department by providing extensive career and professional d...
BBNCALLJOBSROLLUP
Hired Organization Address Washington, DC Intern
Panhandle Power Solutions (PPS) is seeking a driven and detail-oriented individual to join our team as a Tribal Clean En...
BBNCALLJOBSROLLUP
Hired Organization Address Fort Leavenworth, KS Full Time
GSS is seeking a Health Promotion Technician The Health Promotion Technician reports to the Armed Forces Wellness Center...
BBNCALLJOBSROLLUP
Hired Organization Address Fort Campbell, KY Full Time
SpecPro Professional Services, LLC. (SPS) is seeking an individual experienced in watershed management and natural resou...

Not the job you're looking for? Here are some other Sr. Forensic Malware Analyst jobs in the San Antonio, TX area that may be a better fit.

Sr. Forensic Malware Analyst

SSSCANDIDATEPORTAL, San Antonio, TX

Provider Support Analyst Sr

Leidos QTC Health Services, San Antonio, TX