Responsibilities include, but are not limited to:
• Leads and participates in the evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers
• Responsible for providing findings in a technical report with details of the malware, identification parameters, advanced capabilities, and mitigation strategies
• Conducts research in the area of malicious software, vulnerabilities, and exploitation tactics
• Requires experience with application security, network security, reverse engineering, or malware
• Requires strong knowledge of worms, viruses, Trojans, rootkits, botnets, Windows internals, and the Win32 API
• Extensive experience required in programming (assembly and web) and system analysis with various tools, including IDA Pro, Ollydbg, PCAP tools, or TCP Dump
Basic Qualifications:
• Active Top-Secret/SCI
• Minimum of 8 years with BS/BA; Minimum of 6 years with MS/MA; Minimum of 3 years with PhD
• GIAC Certified Forensic Analyst (GCFA)
• Possess DoD 8570.01-M Information Assurance Technician (IAT) Level II Baseline Certification
• Must posses an active, OR have the ability to obtain within 90 days of hire date, an ITIL Foundations Certification
• Must have a full, complete, and in-depth understanding of all aspects of Defensive Cyber Operations
#FortHuachuca
Target Salary Range: $146,000 - $234,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual’s experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
...on experience with automation tools (e.g., Tines, AWS Lambda) and common enterprise security platforms (e.g., CrowdStrike, Zscaler, Splunk). ~ Track record of delivering large-scale, impactful work across multiple quarters and collaborating effectively across teams....
...Come for the Flexibility, Stay for the Culture ( BAYADA Home Health Care was founded on the principle that health care gets better when... ...on call clinical support Requirements: Current valid nursing license and graduation from a qualified nursing program...
...Corporation (FEC) is part of the rapidly growing warehouse and transportation sector that helps... ...loading, unloading, and sorting of packages of various sizes. Part time Federal Express... ...should contact recruitmentsupport@fedex.com. Applicants have rights under Federal...
...What Youll Do Manage revenue recognition and billing processes with accuracy and efficiency Prepare journal entries, reconciliations... ...and smooth financial operations Assist with process improvements to drive efficiency and scalability Requirements 24...
...work rather than accomplishing the mission. Accordus handles accounting, HR, donor management systems, and other industry-specific technical... ...skills Book travel (airfare, rental car, hotel) -International travel booking experience isa plus Push tasks to the finish...