Malware Analyst

Booz Allen HamiltonSan Antonio, TX
4d

About The Position

Malware Analyst The Opportunity: As a security operations center ( SOC ) analyst, you’re in the middle of the action, resp ond ing to and mitigating threats in real time. You’re the first line of cyber defense for your organization, and they look to you for guidance on best practices and security measures. We need a SOC analyst like you to help us secure critical infrastructure from the constant onslaught of cyber-attacks. As a SOC analyst on our team, you’ll develop network defense skills as you learn to monitor, detect, and analyze threats by interacting directly with affected users and state-of-the-art tools and technologies. When an incident is detected, you’ll work with the team to collect data to help incident response understand and mitigate the threat. You’ll analyze alerts to figure out just how many systems are affected and initiate recovery efforts. You’ll contribute to assessments and learn how to analyze patterns to understand attackers’ goals to stop them from succeeding. This is a great opportunity to hone your cybersecurity skills and learn more about threat assessment and incident response. Work with us as we defend against malicious actors. Join us. The world can’t wait.

Requirements

  • Experience in a SOC, incident response, or cyber threat analysis role
  • Experience analyzing logs, network traffic, digital forensics, malware analysis, threat intelligence, and cybersecurity
  • Experience with incident response frameworks such as NIST or MITRE ATT & CK
  • Knowledge of SIEM such as Splunk, Elastic, QRadar, or Sentinel, and EDR such as CrowdStrike or Micro sof t Defender, IDS, and IPS
  • Knowledge of operating system-specific exploitation vectors
  • Ability to travel up to 25% of the time
  • TS / SCI clearance
  • HS diploma or GED
  • DoD 8140 Level II Certification such as Security+, CySA+, or CISSP Certification

Nice To Haves

  • Experience supporting Air Force or DoD Cyber Protection Teams ( CPTs ) or cyber threat intelligence missions
  • Experience in malware classification, unpacking, and behavioral analysis
  • Experience developing custom scripts and automation in Python or PowerShell for analysis workflows
  • Knowledge of adversary TTPs and frameworks such as CAPEC
  • Knowledge of cyber kill chain met hodologies
  • Master’s degree in Cybersecurity, Computer Engineering, or Digital Forensics
  • GREM, GCFA, or OSCP Certification

Responsibilities

  • monitor, detect, and analyze threats
  • collect data to help incident response understand and mitigate the threat
  • analyze alerts to figure out just how many systems are affected and initiate recovery efforts
  • contribute to assessments and learn how to analyze patterns to understand attackers’ goals to stop them from succeeding

Benefits

  • health
  • life
  • disability
  • financial
  • retirement benefits
  • paid leave
  • professional development
  • tuition assistance
  • work-life programs
  • dependent care
  • recognition awards program

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

High school or GED

Number of Employees

1-10 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service