Peraton is seeking a to hire an experienced Senior Malware Engineering Analyst to become part of.. Provide Subject Matter Expert (SME) level malware analysis support in a 24x7x365 environment. Share in..
Responsible for providing findings in a technical report with details of the malware, identification.. Minimum of 3 years with PhD. GIAC Certified Forensic Analyst (GCFA). Possess DoD 8570.01 M Information..
Overview Peraton is a next generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the w..
Summary. Meta is seeking a highly motivated and experienced Malware Reverse Engineer to join a team of.. Required Skills. Malware Reverse Engineer Responsibilities. Identify vulnerabilities and potential..
To apply, click. Apply to Job. online on this web page. Required Skills. Business Analyst Responsibilities. Provide business requirements and collaborate with internal teams on data capture..
To apply, click. Apply to Job. online on this web page. Required Skills. Security Analyst Investigator Responsibilities. Coordinate development and implementation of Intel cycle across a range..
Zachary Piper Solutions is seeking a Incident Response Analyst to join a long term, classified federal.. This is a hybrid position that requires 1 day per week onsite. The Incident Response Analyst will be..
Zachary Piper Solutions is seeking a Sr. SOC Analyst for a position supporting a government contracting.. Technical Leadership, Security Engineering, Digital Forensics, E Discovery, Malware Analysis, Reverse..
As a Software Reverse Engineer, you will be responsible for conducting software exploitation activities, including reverse engineering, development support, and malware analysis efforts..
Analyze host, network, and application logs in addition to malware and code. Prepare and report risk.. Should have 2 years of experience serving as a SOC Analyst or Incident Responder. Ability to work..
Zachary Piper Solutions is seeking a Sr. SOC Analyst for a position supporting a government contracting.. Technical Leadership, Security Engineering, Digital Forensics, E Discovery, Malware Analysis, Reverse..
Zachary Piper Solutions is seeking a Cyber Threat Analyst to work on site in Arlington, VA. The Cyber.. The Cyber Threat Analyst will be responsible for onsite incident response and investigation, assessing..
Zachary Piper Solutions is currently seeking a Sr. Cyber Security Analyst in Springfield, VA to assist.. TS SCI w. CI poly clearance required.Responsibilities for the Sr. Cyber Security Analyst Include..
Position Description Valiant Solutions is seeking a SOC Analyst (Tier 2) to join our rapidly growing and.. Candidates' understanding of malware analysis, advanced persistent threat, infection vectors and defense..
Position Description Valiant Solutions is seeking an Identity and Access Management Analyst. to join our.. to join our rapidly growing and innovative cybersecurity team! Are you an ICAM Analyst with either..
JOB DESCRIPTION Job Description BAE Systems, Inc. is searching for a Mid to Senior level Endpoint Threat Detection and Response analyst to conduct host based defensive cyber operations..
The ideal candidates will be tech savvy analysts with data processing skills who want to grow and develop by initiating analysis on unique data sets. This is a one of a kind opportunity to..
JOB DESCRIPTION Job Description BAE Systems is seeking a Program Analyst to join our dynamic team of.. Program Analysts are expected to facilitate meetings with customers and attend current working groups..
Is searching for a Mid to Senior level Endpoint Threat Detection and Response analyst to conduct host.. Experience with and understanding of common malware tactics and how they interact with victim systems..
We are searching for an onsite Business Systems Analyst to support the Business System Integration Team.. The Role. As an onsite Business Systems Analyst, you will focus on bridging the gap between business..
Job Description BAE Systems is looking for a talented Imagery Analyst (Day Shift) excited to provide.. This effort will require regular collaboration with imagery and geospatial analysts. Analyst will update..
Penetration testing, pen test, pentest, incident report, incident response data analytics, vulnerability, vulnerability assessment, TSSCI POLY, CI POLY, FS POLY, FSPOLY, malware analysis..
As a Software Reverse Engineer, you will be responsible for conducting software exploitation activities, including reverse engineering, development support, and malware analysis efforts..
Expertise in endpoint agent deployment and configurationStrong understanding of endpoint security technologies, such as software firewalls, antivirus, anti malware, and endpoint protection..
We are looking for a Threat Hunt Analyst Jr. to work in Washington, DC supporting our client. Salary.. and application logs in addition to malware and code Prepare and report risk analysis and threat..