Join CSRA and be a part of the team of men and women that solve some of the world’s most complex technical challenges. The Joint Service Provider (JSP) program is searching for a Sr Malware Analyst to join their team inArlington, VA.
The Joint Service Provider (JSP) program provides a full range of information technology products, services, solutions and customer support to the Office of the Secretary of Defense (OSD), the Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff (JS), the Director of Administration (DA), the Pentagon Force Protection Agency (PFPA), the Washington Headquarters Services (WHS) and other various OSD offices to meet mission and business requirements.
Through the accomplishments of the DCO IDM program (formerly known as the Computer Network Defense (CND) Program), JSP performs a wide variety of cybersecurity services and functions required to assure the operational, physical, and information security posture for Department of Defense (DOD) Services within CONUS and OCONUS.
The scopes of the DCO IDM tasks are functionally grouped by End Point Security, Network Security, and Incident Handling.
The Incident/Malware team provides support M-F 0600-2200.
(We have a number of positions available at various experience levels. Please apply as appropriate and we can determine the proper level at interview.)
As the Sr. Analyst, you will:
- Experience with CJCSM 6510.01B
- Demonstrate expert-level knowledge of network traffic and communications, including known ports and services
- Demonstrate expert knowledge of the Windows operating system, expert knowledge in various Linux distributions and the Unix framework
- Demonstrates expert level knowledge of the following security related technologies: IPS, IDS, SIEM, firewalls, DNS, encryption, HIDS, NIDS, proxies, network packet analyzers, malware analysis, forensic tools, and enterprise level appliances
- Demonstrate a deep understanding of various open source and commercial analysis tools used for reverse engineering
- Demonstrate understanding of DOD accreditation policies, processes, and practices
- Demonstrate expert-level knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) operations in an organization similar in size to this acquisition
- Demonstrate expert-level knowledge of the X86 Instruction set
- Demonstrate knowledge of and familiarity with the ARM instruction set
- Demonstrate the ability to analyze complex malicious Windows programs in a reasonable time frame
- Demonstrate expert technical ability in reverse engineering custom protocols used by malware
- Demonstrate intermediate proficiency with one of the following programming languages: Python, C, C++, Ruby
- Bachelors of Science in Computer Science or other related technical degree; an additional 4 years of related experience may be considered in lieu of degree
- 10+ years of Incident Analysis experience in the DOD or IC environment
- DoD 8570 IAT Level III CND Analyst certification or ability to become compliant within six months
- CEH, Sec+, CND-IR, GCIA, GCFA or GCIH certification
- Top Secret – Sensitive Compartmented Information (TS/SCI)