Beyond SOF
Malware Analyst II (MA2)
Salary: Up to $135,500, depending on education and experience
Security Requirements: TS/SCI with CI Poly (both active).
Education: Minimum of bachelor’s degree from an accredited college or university in Computer Engineering, Computer Science, Cybersecurity, or related discipline.
Certifications
DoD 8140/DoD 8570 IAM Level II Certification (minimum)
CSSP Incident Responder or CSSP Infrastructure Support
Experience (Five Years Required)
Employs engineering techniques and processes to analyze software to identify vulnerabilities, re‑creates programs to rebuild something like it, exploits its weaknesses or strengthens its defenses.
Develops design specifications by inspection and analysis to offset various malware and to protect and defend USCYBERCOM infrastructure.
Develops, researches, and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption; conducts vulnerability assessments/penetration tests of information systems.
Ensures software standards are met; designs, develops, documents, tests, and debugs application software and systems that contain logical and mathematical solutions; performs in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM.
Participates in formal technical briefing and proposals.
Performs system analysis, reverse engineering, and static, dynamic, and best‑practice malware analytical methodologies on Windows, Android, or UNIX-based platforms.
Has detailed understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.); malware and programming skills to include C/C++ and Assembly language, and detailed understanding of how network‑based attacks work at the operating system and/or protocol level.
#J-18808-Ljbffr
Certifications
DoD 8140/DoD 8570 IAM Level II Certification (minimum)
CSSP Incident Responder or CSSP Infrastructure Support
Experience (Five Years Required)
Employs engineering techniques and processes to analyze software to identify vulnerabilities, re‑creates programs to rebuild something like it, exploits its weaknesses or strengthens its defenses.
Develops design specifications by inspection and analysis to offset various malware and to protect and defend USCYBERCOM infrastructure.
Develops, researches, and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption; conducts vulnerability assessments/penetration tests of information systems.
Ensures software standards are met; designs, develops, documents, tests, and debugs application software and systems that contain logical and mathematical solutions; performs in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM.
Participates in formal technical briefing and proposals.
Performs system analysis, reverse engineering, and static, dynamic, and best‑practice malware analytical methodologies on Windows, Android, or UNIX-based platforms.
Has detailed understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.); malware and programming skills to include C/C++ and Assembly language, and detailed understanding of how network‑based attacks work at the operating system and/or protocol level.
#J-18808-Ljbffr