Incident Responder

About Raytheon Foreground Security:

Through a strategic approach to security, Raytheon Foreground Security (RFS) enables organizations to optimize their network security investment while taking a proactive approach to protecting their most important information assets from potential threats. Foreground Security provides organizations with the full lifecycle of Information Security Services including SOC operation services, architecture and engineering, assessments, training, technology resale, and implementation and integration.

Our solutions include a combination of software, services and education to help mitigate information security risks that are a part of today’s business world. RFS’ Virtual SOC offerings (V-SOC) are a next generation approach to traditional managed services. While ensuring all customer data remains on premise at their facilities we leverage our client’s existing security infrastructure and integrate our patent pending ATIP (Automated Threat Intelligence Platform) to identify critical Indicators of Compromise (IOC’s). This allows our customers to leverage our expertise where they need it most – in diagnosing and responding to real incidents occurring within their network infrastructure. Our incident response and forensics capabilities are exceptional and are leveraged by many fortune 500 organizations as well as State and Local and Federal Government agencies.


RFS is searching for a Malware Analyst / Forensic Analyst to add to our Forensics Malware Analysis Team (FMAT). If you are eager, willing to learn, and have experience with the full IR process from imaging, forensic analysis, malware analysis to writing reports, then we want to hear from you.

This position is based out of our office in Baltimore, MD with no travel.


  • Performing the full scope of the Incident Response Process:
    • Imaging of devices including mobile
      • Knowledge of Cellebrite
  • Forensic analysis
    • Knowledge of FTK
    • Knowledge of FireEye HX appliance.  With the ability to run IOC sweeps
  • Memory analysis
    • Knowledge of Redline or Volatility (preferred)
  • Malware analysis
    • Dynamic malware analysis of files and URLs
  • Writing reports
  • Ability to communicate well with client


  • 2-5 years experience, malware/forensic analysis
  • Must have experience with FTK or Encase
  • Experience with Memory Forensics strongly preferred
  • GREM, GCFA certifications preferred
  • GCIH, GCFE, EnCE, ACE, CFCE (nice certifications to have but not mandatory)
  • Computer Engineering (preferred), Computer Science or relevant work experience
  • A self start and critical thinker

We offer:

  • Paid professional development for all employees
  • “Work hard, play hard” culture
  • 3 weeks paid vacation
  • 100% company paid medical benefits
  • Social events – happy hours, hackathons, conferences, etc.
  • 401K with matching
  • Work with awesome, like-minded people in a dedicated cyber security company


. . . . . . . .

Leave a Reply