Print

Print


US citizens that are qualified and interested in these positions can forward a resume to  Rob Soligan ([log in to unmask]<mailto:[log in to unmask]>).

2 - Lead Engineer / Analyst  -  Bachelor degree - 8 years experience
Experienced in one of the following engineering disciplines: systems engineering, systems integration, software engineering, information engineering, telecommunications engineering, network engineering, electrical engineering, and data quality engineering (or other relevant engineering disciplines).

2 - Senior Engineer / Analyst - Bachelor degree - 5 years experience
Experience in some of the following or related technical disciplines: data communications, network management, and operational activities of a network; functional requirements analysis; computer security systems; and quality assurance.

Mid-Level Engineer / Analyst - Bachelor degree - 4 years experience
Experienced in one of the following engineering disciplines: systems engineering, systems integration, software engineering, information engineering, telecommunications engineering, network engineering, electrical engineering, and data quality engineering (or other relevant engineering disciplines).

Position Title: Mid / Senior / Lead Security Analyst (Malware Reverse Engineer)
Telecommuting Options:  Telecommuting Not Allowed
Position Work Location (WD)  ROSSLYN,VA-N. LYNN STREET
US Citizenship Required  Yes
Clearance Required  Yes - Interim Required to Start
Clearance Type  Top Secret (TS)

Daily Responsibilities: A challenging opportunity for a Cyber Event Analyst with the Department of State - Technical Analysis and Special Operations Branch (TASO). TASO is a Tier-3 technical analysis group and is the last stop for many challenging technical security issues within the organization.
This person needs to be inquisitive and able to research new highly technical subjects.
Required Degree: varied based on level
Required Basic Qualifications:
* 4-8+ years experience in hands-on system security forensics; malware analysis; reverse engineering; vulnerability assessment; incident response; and/or penetration testing.
* Experience with forensic tools such as EnCase, FTK, NetWitness, WireShark or similar tools.
* Candidate should have a foundation in sound forensic principles, techniques, and processes.
* Advanced understanding of Windows internals and Windows networks including experience analyzing low level Windows details, file locations and registries.
* Experience should include analysis of network traffic and protocols.
* Ability to navigate within a LINUX system as a user to include running scripts and reviewing data.
* Prior experience as a LINUX System Admin is a plus.
* Ability to translate complex technical subjects into business terms for decision makers.
* Experience with and knowledge of typical attack vectors, network exploitation techniques, and exfiltration channels.
* Experience with Yara, OpenIOC, or other host-based signature development
* Experience with Snort or other network-based signature development.
* Experience with one or more programming languages, preferably at least one high level and one low level language. Examples include Python, Java, C, and x86 ASM.
* Penetration testing experience.

US Citizenship is Required.

Required Education: varied
Required Responsibilities:
* Identifying and analyzing software exploits and raw x86 shellcode
* Using a high-level scripting/programming language to extract, deobfuscate, or otherwise manipulate malware related data
* Debugging both user-mode and kernel-mode software
* Providing mitigation suggestions in the context of a security incident, as it relates to the technical analysis of malware or other attack artifacts
* Performing independent research to better understand complex technical problems
* Providing oral briefings on complex technical subjects to senior management and other non-technical audiences
Desired Certifications/Qualifications: CEH, GREM, Encase
Desired Education: B.S Information Security, B.S. Computer Science
Desired Work Experience: 4-8+ years


This email is UNCLASSIFIED.




Bob Osgood
Director Computer Forensics and Data Analytics Engineering
ENGR 3255
[log in to unmask]<mailto:[log in to unmask]>
703-993-5443
http://cfrs.gmu.edu<http://cfrs.gmu.edu/>
http://dataanalytics.gmu.edu<http://dataanalytics.gmu.edu/>

[15-003_GMUunitilogos_VSE_1line4C]