4 days old

Cyber Threat Hunter/Malware Reverse Engineer

Perspecta
Herndon, VA 20170
Business Group Highlights

Information Technology and Facilities

The IT group is strategically aligned to provide effective IT/Facilities support to the Perspecta business. The team is responsible for executing functions to ensure day-to-day IT support, to ensure technology standards are established and followed across the organization, to manage assets and the confidentiality, integrity, security and availability of IT assets, information, data and services. Facilities supports environmental, health and safety operations to ensure safe, comfortable and productive work environments for Perspecta employees.

Responsibilities

  • Coordinate threat hunting activities across the network leveraging intelligence from multiple internal and external sources, as well as cutting- edge security technologies.
  • Work with our Threat Intelligence and Malware solutions to identify threats, develop or recommend countermeasures, and perform advanced network and host analysis in the event of a compromise
  • Analyze malicious campaigns and evaluate effectiveness of security technologies.
  • Track threat actors and associated tactics, techniques, and procedures (TTPs).
  • Lead response and investigation efforts into advanced/targeted attacks.
  • Design and build custom tools for investigations, hunting, and research.
  • Identify gaps in IT infrastructure by mimicking an attackers behaviors and responses.
  • Perform Root Cause Analysis of security incidents for further enhancement of alert catalog.
  • Leverage internal and external resources to research threats, vulnerabilities, and intelligence on various attackers and attack infrastructure
  • Analyze network traffic, IDS/IPS/DLP events, packet capture, and FW logs.
  • Assist in incident response activities such as host triage and retrieval, malware analysis, remote system analysis, end-user interviews, and remediation efforts.
  • General SIEM monitoring, analysis and content development
  • Conducts reverse-engineering for known and suspected malware files.
  • Performs research in the area of malicious software, vulnerabilities, and exploitation tactics
  • Develops network and host based signatures to identify specific malware

Qualifications

  • Requires 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.
  • Demonstrated to advanced operational experience as a Cyber Threat Hunter
  • Demonstrated to advanced experience with computer networking and operating systems
  • Demonstrated to advanced experience of current threats, vulnerabilities, and attack trends
  • Familiarity with: Netflow data, DNS logs, Proxy Logs
  • Security+, CISSP, GCTI, GCIH, GCIA and GREM

About Perspecta

What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sectorfrom investigative services and IT strategy to systems work and next-generation engineering.

Our promise is simple: never stop solving our nations most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to just that, as a partner of choice across the entire sector.

Perspecta is an AA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories.

Email this job to a friendRefer
Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed




As a government contractor, Perspecta abides by the following provision
PAY TRANSPARENCY NONDISCRIMINATION PROVISION
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
Posted: 2019-09-14 Expires: 2019-10-13

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Cyber Threat Hunter/Malware Reverse Engineer

Perspecta
Herndon, VA 20170

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast