Forensics Malware Analyst

Location: Ft. Huachuca, AZ
Date Posted: 06-27-2018
Job Title:                    Forensics Malware Analyst
Job Location:             Fort Huachuca, AZ
Salary:                        Competitive, Depends on Qualifications
Clearance:                  Current DoD active Top Secret/SCI
Travel:                        Up to 25% CONUS
 
Purpose:
The purpose of this task is to provide all personnel, equipment, supplies, facilities, transportation, tools, materials, supervision, and other items and non-personal services necessary to support the RCC-C.
 
Responsibilities:
The Forensics / Malware Analyst (DCO) assists the DCO analysts with complex analysis of forensic, event and signature data as well as binary, mobile, executable code leading to the detection of a variety of threat types including malware and potentially advanced persistent threats. They document the analysis techniques in a triage database to assist others in timely kill chain analysis.
  • Threat Detection and Analysis: Conduct exploratory and in-depth analysis of network traffic from security devices, analysis of host based audit logs, malware analysis, trending of incident reports, correlation of classified and open source threat reporting, and linkages/integration with other DCO agencies. Documentation will include any identified advanced persistent threat that is currently not being detected through traditional means, document the process (analysis techniques, tools, scripts used) identified, and develop a definable and repeatable process to facilitate further triage efforts and situational awareness of the DCO Analysts. ARCYBER Cyberspace Operations (CO) meetings, conferences, and working groups: Attend local or distant meetings, conferences and working groups as requested prepared to discuss and provide advice regarding CO issues and provide assessment of impact on supported operations; Support the official position of the organization in line with DoD doctrine and local guidance; Document via trip reports listing participants and describing topics of discussion, decisions and action items upon completion of the event.
 
Education:
 
  • Bachelor’s degree in Computer Science, cyber Security, Information Security or related Field.
 
 
Required Certifications:
 
  • GIAC Certified Forensic Analyst (GCFA), GIAC Certified Incident Handler (GCIH),
  • IAT Level II Baseline Certification
                                                                                          
Required Skills/Qualifications:
  • Minimum six (6) years demonstrated/practical hands-on experience performing forensics and malware analysis in a DoD network environment.
  • Required training GCFA, GIAC Certified Incident Handler
*****POSITION IS CONTINGENT UPON AWARDING OF A GOVERNMENT CONTRACT*****
About the company:
 
As a Service Disabled, Veteran Owned Small Business (SDVOSB) we are a provider of Information Technology (IT) professional services, software solutions and professional development training. Our core competencies evolved from leveraging IT enablers for knowledge management with an emphasis on Web Based Knowledge Portals and Portal Services, Server/System Services, SharePoint Development and System Administration and SQL Server Services. Our capabilities have expanded to include software development, technical training support and field support services.
 
Guiding Principles
•         Satisfy the customer - "Exceed expectations"
•         Set the Example - "Be out front"
•         Be Responsive - "Timing is everything"
•         Persevere - "Find a way"
 
Benefits
PTP offers a comprehensive benefits program:
•         Medical insurance
•         Dental insurance
•         Vision insurance
•         Supplemental benefits (Short Term Disability, Cancer & Accident).
•         Employer-sponsored Basic Life & AD&D Insurance
•         Employer-sponsored Long Term Disability
•         401(k)
 
Holidays and Annual Leave
•         10 Paid Holidays
•         120 hours PTO accrual


 
this job portal is powered by CATS