Peraton is currently seeking to hire an experienced Malware Analyst for the USCYBERCOM program. Location: On-site at Fort Meade, MD. In this role you will: Represent USCYBERCOM to provide requirements and integration support for malware analysis. Analyze and understand the behavior of malware using dynamic malware analysis and reverse engineering techniques. Create in-depth malware reports to aid in the identification and mitigation of future cyber threats. Support malware analysis efforts required for the delivery of Mission Assurance (MA) products as part of the effort to facilitate, evaluate, and report on malware in support of cyberspace operations. Provide updates and report on the status of assigned Workflow Management System (WMS) malware tasks and participate in technical working groups and discussions to influence recommendations to malware analysis and exploitation strategy. Participate and facilitate System Security Plan (SSP) development and certification and accreditation support for new malware analysis systems. As a Malware Analyst you should: Possess mid-to-senior level experience as a Malware Analyst with a background in cutting-edge cyberspace technologies. Apply knowledge on subjects relating to the conduct of Malware Analysis activities through governance, policy oversight, and business practices. Work under consultative direction toward predetermined Mission Assurance goals and objectives; assignments are often self-initiated. Develop, research, and maintain proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption. Perform in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM. Perform system analysis, reverse engineering, and best practice malware analytics methodologies and analysis on Windows, Android, or UNIX-based platforms. Possess comprehensive knowledge of programming skills:including C/C++ and Assembly language, Windows internal C/C++ and either UNIX/Linux or mobile (Android) platform, vulnerability analysis, exploit development, and related disciplines. Create malware detection topologies; conduct vulnerability assessments/penetration tests of information systems.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Number of Employees
5,001-10,000 employees