Raytheon

Sr. Malware Analyst

Posted on: 6 Feb 2021

Rosslyn, VA

Job Description

RIS has an immediate job opening for a cleared Cyber Malware Analyst to support a U.S. Federal Agency contract to enable mission accomplishment by having experience understanding and analyzing cyber tools and malware samples in support of regular investigations, creating cyber intelligence products. The analyst will utilize instruments, sources, methods and data to provide context about the evolving threat landscape. Ability to interpret and analyze large, ambiguous data sets and experience in writing analysis reports.

Work Location: Rosslyn, VA

Job Description: Resolves highly complex malware and intrusion issues using computer host analysis, forensics, and reverse engineering. Discovers, analyzes, diagnoses, and reports on malware events, files and network intrusion and vulnerability issues. Recommends counter measures to malware and other malicious type code and applications that exploit customer communication systems. conducts reverse engineering for known and suspected malware files. Develops analysis and make recommendations for the purchase of hardware and or software that will mitigate malware intrusions. Develops policies and procedures to investigate malware incidents for the entire computer network. Assists in the development and delivery of malware security awareness products and briefings.

Job Responsibilities:

Shall perform specific activities that include, but not limited to the following:

Provide analysis support 24x7x365

Render technical assistance for criminal investigations and non-security related operational events as needed Contribute input to the Cyber Security Daily (CSD)

Conduct advance analysis and recommend remediation steps for cyber security events and incidents Required Skills:

Experience with malware analysis and reverse engineering, network analysis tools, static and dynamic analysis tools

Ability to automate analysis tasks, develop scripts to decode obfuscated data and network communications, analyze obfuscated code

Understanding of software exploits, identifying host- and network-based indicators, using leading forensic tools such as but not limited to Access Data FTK, Guidance EnCase, Paraben P2 eXplorer, X-Ways Forensics, FireEye, Volatility, CloudStrike

Knowledge with using mobility and open source forensic tools like Magnet Axiom, BlackBag Mobilyze, Cellebrite UFED, Paraben E3:DS, The Sleuth Kit (TSK) and Autopsy, BlackBag tools

Proficient with malware analysis, sandboxing, and software reverse engineering

Experience with scripting languages such as Python and PowerShell

Knowledge of MITRE ATT&CK framework, and its uses within the cybersecurity community

Knowledge of and practical experience of integration of COTS or open source tools

Personality traits: Naturally curious and inquisitive nature; perseverant and hardworking; loves solving problems and puzzles; critically rigorous; uncompromising integrity

Demonstrated ability to document processes

Proficiency with MS Office Applications

Able to work collaboratively across teams and physical locations

Willing to work rotating shifts

Required Certifications:

Possess at least one relevant professional designation or related advanced IT certification, but not limited to the following:

Certified Information Systems Security Professional (CISSP)

GIAC Reverse Engineering Malware (GREM)

GIAC Certified Incident Handler (GCIH)

GIAC Network Forensic Analyst (GNFA)

GIAC Intrusion Analyst (GCIA)

Desired Skills:

Experience with RSA Netwitness, Splunk, FireEye NX, EX, HX, AX, Carbon Black Response, RSA Archer

Current experience with network intrusion detection and response operations (Protect, Defend, Respond and Sustain methodology)

Experience in the detection, response, mitigation, and/or reporting of cyber threats affecting client networks and one or more of the following:

Experience in computer intrusion analysis and incident response

Working knowledge of Intrusion detection/protection systems

Knowledge and understanding of network devices, multiple operating systems, and secure architectures

Working knowledge of network protocols and common services

System log analysis

Experience with SIEMS content analysis, development and testing, tools such as NetWitness, Splunk, SumoLogic, QRadar

Experience with EDR solutions (Carbon Black, Crowdstrike, FireEye, SentinelOne)

Familiarity with packet analysis to include: HTTP Headers & Status codes, SMTP Traffic & Status codes, FTP Traffic & Status Codes

Excellent written and verbal communication skills

Prior experience working in any of the following: Security Operations Center (SOC); Network Operations Center (NOC); Computer Incident Response Team (CIRT)

Desired Certifications:

Possess at least one relevant professional designation or related advanced IT certification, but not limited to the following:

GIAC Certified Enterprise Defender (GCED)

GIAC Security Expert (GSE)

Certified Information Security Manager (CISM)

Certified Ethical Hacker (CEH)

Required Education:

BS Degree with major in Computer Science/Electrical Engineering, Engineering, Science or a related field.

Must have a minimum of 9+ years experience or equivalent education and experience.

* Must have an active TS with the ability to obtain a TS/SCI clearance

* Occasional travel within CONUS and OCONUS is required

165705

Raytheon

Waltham, MA

Raytheon Company develops integrated products, services, and solutions for the defense and other government markets worldwide. It operates through five segments: Integrated Defense Systems (IDS); Intelligence, Information and Services (IIS); Missile Systems (MS); Space and Airborne Systems (SAS); and Forcepoint. The IDS segment offers integrated air and missile defense; land-and sea-based radar solutions; command, control, communications, computers, cyber, and intelligence solutions; naval combat and ship electronic and sensing systems; and undersea sensing and effects solutions.

The IIS segment provides technical and professional services, such as navigation, DoD space and weather solutions, cybersecurity, analytics, training, logistics, mission support, software-based systems, automation and sustainment solutions, and air traffic management systems, as well as intelligence, surveillance, and reconnaissance solutions. The MS segment develops and supports weapon systems comprising missiles, smart munitions, close-in weapon systems, projectiles, kinetic kill vehicles, directed energy effectors, and combat sensor solutions.

The SAS segment provides civil and military electro-optical/infrared sensors; airborne radars for surveillance and fire control applications; lasers; precision guidance systems; signals intelligence systems; processors; electronic warfare systems; tactical and strategic communications; and space-qualified systems. The Forcepoint segment offers cyber security products that include risk adaptive data loss prevention; user and entity behavior analytics and cloud access security broker capabilities; insider threat solutions; firewall technology; cloud and on premise Web and email security; and cross domain transfer products.

Raytheon Company has a strategic agreement with AirMap to collaborate on future projects to safely integrate drones into the national airspace system. The company was founded in 1922 and is headquartered in Waltham, Massachusetts.

Similar Jobs