Employer: Create Account or Login
Sign In
 [New User? Sign Up]
Mobile Version

Senior Malware Analyst - End Point Security Job


Fort Meade, MD
Job Code:
Apply on the Company Site
  • Save Ad
  • Email Friend
  • Print
  • Research Salary

Job Details

Senior Malware Analyst - End Point Security Job

Senior Malware Analyst - End Point Security Job

Date: Feb 25, 2018

Location: Fort Meade, MD, US

Company: SAIC

Senior Malware Analyst - End Point Security (Job Number:431259)


The National Security Customer Group of SAIC currently has a full-time position for a Malware Analyst to support the US Cyber Command (USCYBERCOM) J3, in Fort Meade, Maryland


This task requires knowledge of computer network theory, ability to understand communication methods and malicious properties, and TTPs of advanced persistent threats. Additionally, this task requires technical knowledge of malware analysis, incident handling, ethical hacking, and drafting and implementing security incident response policies.

The End Point Security Support Analyst conducts gap analysis activities and provides analysis and recommendations reports for alleviating shortfalls and capability gaps on DoD policy and guidance as well as shortfalls on network/system architectural designs. Develops analysis and recommendation reports in response to official inquiries on alerts, incidents, and mitigation strategies. Provides technical expertise, programmatic, and operational planning support for implementing Endpoint Security products across the DODIN enterprise and providing status update briefings. Provides analysis and recommendation reports on the identification of an automated analytical standard to be used as an enterprise architectural framework. Provides input to, and updating implementation policy and guidance for the configuration, implementation, monitoring, and expansion of Endpoint Security products and associated architecture, and for contributing to the development of overarching DoD-level guidance and standards for managing DoD network trends, performance, and functionality. Compiles and analyzes network traffic reports and logs in support of subordinate compiling incident response and disseminating analysis reports at the appropriate classification level(s), and maintaining the reports in associated repositories (i.e., Fusion Matrix or similar). Deconflicts new exploits and security vulnerabilities, analyzes trends of malicious code, documents host/network signatures, and develops mitigation and remediation strategies for dissemination to Combatant Command/Service/Agency/Field Activities (CC/S/A/FA). Conducts strategic analyses on various products, such as DoD component reporting and Intelligence Community reporting products, providing analysis, and coordinating with the JOC and CC/S/A/FAs to address areas of concern. Collaborates with the DISA and other stakeholders to assist in developing programmatic oversight requirements for future Endpoint Security product capabilities of evolving software security baselines and operating system compatibility efforts; and developing content (i.e., dashboards, queries, and reports) to support ad hoc and recurring mission tasking, as well as facilitate data pulls with supplemental queries and/or dashboard development.

Daily activities include:

Employs engineering techniques and processes to analyze software to identify vulnerabilities

Re-creates programs to rebuild something similar to it, exploits its weaknesses, or strengthens its defenses

Develops design specifications by inspection and analysis to offset various malware and to protect and defend USCYBERCOM infrastructure

Develops, researches, and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption

Conducts vulnerability assessments/penetration tests of information systems

Ensures software standards are met; designs, develops, documents, tests, and debugs applications software and systems that contain logical and mathematical solutions

Performs in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM

Participates in formal technical briefing and proposals

Performs system analysis, reverse engineering, and static, dynamic, and best- practice malware analytical methodologies on Windows, Android, or UNIX – based platforms.

Demonstrates an in-depth understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.), malware and programming skills to include C/C++ and Assembly language, and detailed understanding of how network-based attacks work at the operating system and/or protocol level



Minimum of five (5) years of experience as a Malware Analyst with a Bachelor’s Degree from an accredited college or university in Computer Engineering, Computer Science, Cybersecurity, Computer Engineering, or related discipline; or three (3) years of experience and a Master's Degree

A minimum of DoD 8140/DoD 8570 IAM Level I Certification (CAP, GSLC, SEC+)

Strong attention to detail and organizational skills.

Excellent communications skills.


ACTIVE TS/SCI with Polygraph

SAIC Overview:SAIC is a premier technology integrator providing full life cycle services and solutions in the technical, engineering, intelligence, and enterprise information technology markets. SAIC is Redefining Ingenuity through its deep customer and domain knowledge to enable the delivery of systems engineering and integration offerings for large, complex projects. SAIC has approximately 15,000 employees are driven by integrity and mission focus to serve customers in the U.S. federal government. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $4.5 billion. For more information, visit saic.com.

EOE AA M/F/Vet/Disability

Job Posting: Oct 3, 2017, 4:00:00 AM
Primary Location: United States-MD-FORT MEADE
Clearance Level Must Currently Possess: Top Secret/SCI with Polygraph
Clearance Level Must Be Able to Obtain: None
Potential for Teleworking: No
Travel: Yes, 25% of the time
Shift: Day Job
Schedule: Full-time

Nearest Major Market: Baltimore
Nearest Secondary Market: Washington DC

Job Segment: Engineer, Drafting, Computer Science, Information Systems, Security, Engineering, Technology

Apply on the Company Site
Powered ByLogo

Featured Job

Featured Employer

© Adicio Inc.