Campus Pride Jobs

Mobile Campus Pride Logo

Job Information

Raytheon Technologies Cyber Malware Analyst in Rosslyn, Virginia

Raytheon Intelligence and Space (RIS) – Cybersecurity, Training & Services (CTS) has an immediate job opening for a Cyber Malware Analyst to support a U.S. Federal Agency contract to enable mission accomplishment by having experience understanding and analyzing cyber tools and malware samples in support of active investigations, creating cyber intelligence products.

The analyst will utilize tools, sources, methods and data to provide context about the evolving threat landscape. The successful candidate must have the ability to interpret and analyze large, ambiguous data sets and experience in writing analysis reports.

Location: National Capital Region (Rosslyn, VA)

Job Description:

Resolves highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering. Discovers, analyzes, diagnoses, and reports on malware events, files and network intrusion and vulnerability issues. Recommends counter measures to malware and other malicious type code and applications that exploit customer communication systems. conducts reverse engineering for known and suspected malware files. Develops analysis and make recommendations for the purchase of hardware and or software that will mitigate malware intrusions. Develops policies and procedures to investigate malware incidents for the entire computer network. Assists in the development and delivery of malware security awareness products and briefings.

Job Responsibilities:

Shall perform specific activities that include, but not limited to the following:

•Provide analysis support 24x7x365

•Render technical assistance for criminal investigations and non-security related operational events as needed

•Contribute input to the Cyber Security Daily (CSD)

•Conduct advance analysis and recommend remediation steps for cyber security events and incidents

Required Skills:

•Experience with malware analysis and reverse engineering, network analysis tools, static and dynamic analysis tools

•Ability to automate analysis tasks, develop scripts to decode obfuscated data and network communications, analyze obfuscated code

•Understanding of software exploits, identifying host- and network-based indicators, using leading forensic tools such as but not limited to Access Data FTK, Guidance EnCase, Paraben P2 eXplorer, X-Ways Forensics, FireEye, Volatility, CloudStrike

•Knowledge with using mobility and open source forensic tools like Magnet Axiom, BlackBag Mobilyze, Cellebrite UFED, Paraben E3:DS, The Sleuth Kit (TSK) and Autopsy, BlackBag tools

•Proficient with malware analysis, sandboxing, and software reverse engineering

•Experience with scripting languages such as Python and PowerShell

•Knowledge of MITRE ATT&CK framework, and its uses within the cybersecurity community

•Knowledge of and practical experience of integration of COTS or open source tools

•Personality traits: We are looking for a team member who is curious and creative; persistent and determined; loves solving problems and puzzles; analytically rigorous; with uncompromising integrity

•Demonstrated ability to document processes

•Proficiency with MS Office Applications

•Must be able to work collaboratively across teams and physical locations

•You will nurture customer relationships

•Willing to work rotating shifts

•Must be able to obtain a Secret Clearance

Required Certifications:

Possess at least one relevant professional designation or related advanced IT certification, but not limited to the following:

•Certified Information Systems Security Professional (CISSP)

•GIAC Reverse Engineering Malware (GREM)

•GIAC Certified Incident Handler (GCIH)

•GIAC Network Forensic Analyst (GNFA)

•GIAC Intrusion Analyst (GCIA)

Desired Skills:

•Experience with RSA Netwitness, Splunk, FireEye NX, EX, HX, AX, Carbon Black Response, RSA Archer

•Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)

•Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of the following: Experience in computer intrusion analysis and incident response; Working knowledge of Intrusion detection/protection systems; Knowledge and understanding of network devices, multiple operating systems, and secure architectures; Working knowledge of network protocols and common services; System log analysis

•Experience with SIEMS content analysis, development and testing, tools such as NetWitness, Splunk, SumoLogic, QRadar

•Experience with EDR solutions (Carbon Black, Crowdstrike, FireEye, SentinelOne)

•Familiarity with packet analysis to include: HTTP Headers & Status codes, SMTP Traffic & Status codes, FTP Traffic & Status Codes

•You are an excellent communicator

•Prior experience working in any of the following: Security Operations Center (SOC); Network Operations Center (NOC); Computer Incident Response Team (CIRT)

Desired Certifications:

Possess at least one relevant professional designation or related advanced IT certification, but not limited to the following: •GIAC Certified Enterprise Defender (GCED)

•GIAC Security Expert (GSE)

•Certified Information Security Manager (CISM)

•Certified Ethical Hacker (CEH)

Required Education:

BS Degree with major in Computer Science/Electrical Engineering, Engineering, Science or a related field. Must have a minimum of 2+ years’ experience or equivalent education and experience.

*Occasional travel within CONUS and OCONUS is required

165386

Raytheon is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, age, color, religion, creed, sex, sexual orientation, gender identity, national origin, disability, or protected Veteran status.

DirectEmployers