Malware Analyst

Booz Allen HamiltonSan Antonio, TX
13d

About The Position

Malware Analyst The Opportunity: As a security operations center (SOC) analyst, you’re in the middle of the action, responding to and mitigating threats in real time. You’re the first line of cyber defense for your organization, and they look to you for guidance on best practices and security measures. We need a SOC analyst like you to help us secure critical infrastructure from the constant onslaught of cyber attacks. As an Malware Analyst on our team, you’ll develop network defense skills as you learn to monitor, detect, and analyze threats by interacting directly with affected users and state-of-the-art tools and technologies. When an incident is detected, you’ll work with the team to collect data to help incident response understand and mitigate the threat. You’ll analyze alerts to figure out just how many systems are affected and initiate recovery efforts. You’ll contribute to assessments and learn how to analyze patterns to understand attackers’ goals to stop them from succeeding. This is a great opportunity to hone your cybersecurity skills and learn more about threat assessment and incident response. Work with us as we defend against malicious actors. Join us. The world can’t wait.

Requirements

  • Experience in an SOC, incident response, or cyber threat analysis role
  • Experience analyzing logs, network traffic, digital forensics, malware analysis, threat intelligence, and cybersecurity
  • Experience with incident response frameworks such as NIST or MITRE ATT&CK
  • Knowledge of SIEM such as Splunk, Elastic, QRadar, or Sentinel and EDR, including CrowdStrike or Microsoft Defender, IDS, and IPS
  • Knowledge of operating system-specific exploitation vectors
  • TS/SCI clearance
  • HS diploma or GED
  • DoD 8140 Level II Certification such as Security+, CySA+, or CISSP Certification

Nice To Haves

  • Experience supporting Air Force or DoD Cyber Protection Teams (CPTs) or cyber threat intelligence missions
  • Experience in malware classification, unpacking, and behavioral analysis
  • Experience developing custom scripts and automation in Python or PowerShell for analysis workflows
  • Knowledge of adversary TTPs and frameworks such as CAPEC
  • Knowledge of cyber kill chain methodologies
  • Master’s degree in Cybersecurity, Computer Engineering, or Digital Forensics
  • GREM, GCFA, or OSCP Certification

Responsibilities

  • monitor, detect, and analyze threats
  • collect data to help incident response understand and mitigate the threat
  • analyze alerts to figure out just how many systems are affected and initiate recovery efforts
  • contribute to assessments and learn how to analyze patterns to understand attackers’ goals to stop them from succeeding

Benefits

  • health, life, disability, financial, and retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service