What are the responsibilities and job description for the Malware Analyst II/III position at Key Cyber Solutions?
Key Cyber Solutions (KCS) is a leading enterprise IT consulting firm that specializes in Secure Agile Software Development, Cybersecurity, Enterprise IT and Data Management services for both government and healthcare organizations. Our approach to business is both aggressive and agile. We value a strong work-ethic, good judgement, organizational skills and, most importantly, an entrepreneurial spirit. At KCS we treat our employees like family and, in turn, they pay that respect forward to every one of our clients.
Candidate will support malware analyst efforts required for delivery of Mission Assurance (MA) products as part of the effort to facilitate, evaluate, and report on malware in support of cyberspace operations. While representing USCYBERCOM, the candidate provides requirements, and integration support for malware analysis; updates and report on the status of assigned Workflow Management System (WMS) malware tasks; participates in technical working groups and discussions to influence recommendations to malware analysis and exploitation strategy; facilitate SSP development and certification and accreditation support for new malware analysis systems; performs triage, static, and dynamic malware analysis, and best-practice malware analytics methodologies; support operations oversight and governance for malware throughout the DODIN
Possesses mid to senior-level experience as a Malware Analyst with a background in cutting-edge cyberspace technologies
- Applies knowledge on subjects relating to the conduct of Malware Analysis activities through governance, policy oversight,and business practices
- Works under consultative direction toward predetermined Mission Assurance goals and objectives; assignments are often self-initiated
- Develops, researches, and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption
- Performs in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM
- Often and without source code or documentation, performs system analysis, reverse engineering, as well as best practice malware analytics methodologies and analysis on Windows, Android, or UNIX-based platforms
- Possesses comprehensive knowledge of programming skills especially including C/C and Assembly language, Windows internal C/C and either UNIX/Linux or mobile (Android) platform, exploit development, and related disciplines
- Creates malware detection topologies; conducts vulnerability assessments/penetration tests of information systems
- Minimum 10 ' '' years of experience as a Malware Analyst
- Minimum of Bachelor’s Degree from an accredited college or university in Computer Engineering, Computer Science, Cybersecurity, Computer Engineering, or related discipline
- A minimum of DOD 8140/DOD 8570 IAM Level III Certification, CSSP Manager• Strong attention to detail and organizational skills. Excellent communications skills
Additional Capabilities Required:
- Understands source code, hex, binary, regular expression, data correlation, and analysis such as firewall, network flow, and system logs
- Familiar with security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, incident handling, etc)
- Coordinates effort to develop and analyze Defensive Cyberspace Operations (DCO), Computer Network Exploitation (CNE), and Offensive Cyberspace Operations (OCO) solutions
- Knowledge of Metasploit, x86, x64, penetration testing, python, BSides organizer, and Capture the Flag competition
Additional Information
As a HUBZone certified business, we STRONGLY encourage candidates who reside in a HUBZone to apply. To confirm if your home address is within a HUBZone, please visit http://map.sba.gov/hubzone/maps/.
***Please note in your cover letter if you reside within a designated HUBzone location. ****
- All your information will be kept confidential according to EEO guidelines.