Logo
Beyond SOF

Malware Analyst II (MA2)

Beyond SOF, Fort Meade

Save Job

Malware Analyst II (MA2)

Salary: Up to $135,500, depending on education and experience
Security Requirements: TS/SCI with CI Poly (both active).
Education: Minimum of bachelor’s degree from an accredited college or university in Computer Engineering, Computer Science, Cybersecurity, or related discipline.

Certifications

  • DoD 8140/DoD 8570 IAM Level II Certification (minimum)
  • CSSP Incident Responder or CSSP Infrastructure Support

Experience (Five Years Required)

  • Employs engineering techniques and processes to analyze software to identify vulnerabilities, re‑creates programs to rebuild something like it, exploits its weaknesses or strengthens its defenses.
  • Develops design specifications by inspection and analysis to offset various malware and to protect and defend USCYBERCOM infrastructure.
  • Develops, researches, and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption; conducts vulnerability assessments/penetration tests of information systems.
  • Ensures software standards are met; designs, develops, documents, tests, and debugs application software and systems that contain logical and mathematical solutions; performs in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM.
  • Participates in formal technical briefing and proposals.
  • Performs system analysis, reverse engineering, and static, dynamic, and best‑practice malware analytical methodologies on Windows, Android, or UNIX-based platforms.
  • Has detailed understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.); malware and programming skills to include C/C++ and Assembly language, and detailed understanding of how network‑based attacks work at the operating system and/or protocol level.

#J-18808-Ljbffr