We are seeking an experienced Malware Senior Engineer, Subject Matter Expert to become part of the Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program. The role provides leading cyber and technology security expertise to enable innovative, effective, and secure business processes.
Location : Beltsville, MD and Rosslyn, VA. Hybrid and flexible schedule preferred; continuous on‑site presence required during significant cyber incidents.
Program Overview
The DSCM program encompasses cyber security, data analytics, engineering, technical, managerial, operational, logistical and administrative support to aid and advise DOS Cyber & Technology Security (CTS) Directorate. It includes protecting a global cyber infrastructure comprising networks, systems, information, and mobile devices while identifying and responding to cyber risks and threats.
Responsibilities
- Provide static and dynamic malware analysis support in a 24x7x365 environment.
- Contribute to the Shift Change Document.
- Conduct advanced analysis and recommend remediation steps for cybersecurity events and incidents.
- Publish after‑action reports, cyber defense techniques, guidance, and incident reports.
- Respond to and assist with the resolution of suspected or successful cybersecurity breaches or violations.
- Share knowledge and intelligence from cybersecurity events with stakeholders.
- Assist in training junior level analysts.
- Analyze network and host logs.
- Perform network searches, artifact collection, and timeline analysis using various EDR tools.
- Prevent potential cybersecurity threats and vulnerabilities.
- Assist in the development and implementation of training programs for malware analysts.
- Review, draft, edit, update, and publish cyber incident response plans.
Qualifications
Bachelor’s degree and 12 years of relevant experience.Alternatively, 4 years of work experience may be considered in lieu of a degree.Ability to resolve complex malware and intrusion issues using host analysis, forensics, and reverse engineering.Recommend countermeasures to malicious code affecting customer communication systems.Experience with debuggers, disassemblers, unpacking tools, and binary analysis tools.Expertise in static and dynamic malware analysis.Identify remediation steps for cybersecurity events.Experience with Splunk and EDR tools such as Microsoft Defender for Endpoint (MDE) and Tanium.Analyze various operating system log types.Develop policies and procedures to investigate malware incidents across enterprise networks.Knowledge of IOCs, APT threat actors, incident response lifecycle, host and network forensics.Strong organizational skills and ability to operate in a time‑sensitive environment.Excellent oral and written communication; brief senior leadership.Collaborate with cross‑functional teams.At least one of the following active certifications : CASP+ CE, CCISO, CCNA Cyber Ops, CCNA‑Security, CCNP Security, CEH, CISA, CISM, CISSP (or Associate), CISSP‑ISSAP, CISSP‑ISSEP, Cloud+, CySA+, GCIH, GCIA, GCIP, GSLC, SCYBER.Active Interim Top Secret security clearance with SCI eligibility.Preferred
Understanding of Security Operations Center processes.Experience with ServiceNow Ticketing Software.Handle state and national‑level intrusions.Utilize forensic tools to determine scope and severity of incidents.Knowledge of high‑ and low‑level programming.Develop and deliver comprehensive training programs.For any questions regarding this job announcement or the status of your application, please contact our Director of Recruiting, Mr. Brian Jennings, via email at bjennings@agr-us.com.
#J-18808-Ljbffr