Malware Analyst Level 2 - TCW

Clearance Level
Top Secret SCI + Polygraph
Category
Cyber Security
Location
Annapolis Junction, Maryland

REQ#: RQ123016

Travel Required: 10-25%
Requisition Type: Pipeline

At GDIT, we foster a people-centric environment. As a Malware Analyst supporting our client, you will be trusted to work on very centric and cutting-edge technology. In this role, a typical day will include but not limited to:

  • Conduct both dynamic and static analysis of suspicious code in order to establish malicious capability and determine potential impact
  • Experience with host and network monitoring for analysis of malware execution & propagation methodologies
  • Perform analysis on captured data, such as audit, log, network traffic, et cetera, to identify any intrusion-related artifacts
  • Understanding of operating system-specific exploitation vectors
  • Analyze malicious code by employing tools, scripting languages, and leveraging virtual machines/environments
  • Support 24/7 monitoring of malware threats to NSA networks, hosts, mission platforms, and boundaries
  • Generate documentation of vulnerabilities and exploits used by malware in written reports
  • Communicate written and verbal information in a timely, clear, and concise manner
  • Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
  • Generate technical summary of findings in accordance with established reporting procedures
  • Develop and recommend mitigation strategies
  • Develop signatures, techniques, and rules to identify malware vectors
  • Collaborate with internal and external organizations to discover new threats, develop mitigation techniques, processes, and tools which further the CSSP mission, as directed by the customer
  • Evaluate emerging threats
  • Correlate data from multiple sources to identify probable threat actors

WHAT YOU’LL NEED:

  • Five (5) years of demonstrated experience in cybersecurity
  • Three (3) years of demonstrated experience with malware analysis
  • Two (2) years of demonstrated experience with tools such as GHIDRA,
  • SYSInternals, FireEye AX, or similar technologies
  • One (1) year of demonstrated experience with development of code in languages such as Python, Lua, C/C++, Ruby or similar
  • Requires DoD 8570 compliance with CSSP Analyst baseline certification, Information Assurance Technical (IAT) Level I or Level II certification, and Computing Environment (CE) certification

About Our Work

We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

COVID-19 Vaccination

GDIT does not have a vaccination mandate applicable to all employees. To protect the health and safety of its employees and to comply with customer requirements, however, GDIT may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.