US citizens that are qualified and interested in these positions can forward a resume to  Rob Soligan ([log in to unmask]).  

2 - Lead Engineer / Analyst  -  Bachelor degree – 8 years experience

Experienced in one of the following engineering disciplines: systems engineering, systems integration, software engineering, information engineering, telecommunications engineering, network engineering, electrical engineering, and data quality engineering (or other relevant engineering disciplines).

 

2 - Senior Engineer / Analyst – Bachelor degree – 5 years experience

Experience in some of the following or related technical disciplines: data communications, network management, and operational activities of a network; functional requirements analysis; computer security systems; and quality assurance.

 

Mid-Level Engineer / Analyst – Bachelor degree – 4 years experience

Experienced in one of the following engineering disciplines: systems engineering, systems integration, software engineering, information engineering, telecommunications engineering, network engineering, electrical engineering, and data quality engineering (or other relevant engineering disciplines).

 

Position Title: Mid / Senior / Lead Security Analyst (Malware Reverse Engineer) 

Telecommuting Options:  Telecommuting Not Allowed 

Position Work Location (WD)  ROSSLYN,VA-N. LYNN STREET

US Citizenship Required  Yes 

Clearance Required  Yes - Interim Required to Start 

Clearance Type  Top Secret (TS) 

 

Daily Responsibilities: A challenging opportunity for a Cyber Event Analyst with the Department of State - Technical Analysis and Special Operations Branch (TASO). TASO is a Tier-3 technical analysis group and is the last stop for many challenging technical security issues within the organization.

This person needs to be inquisitive and able to research new highly technical subjects. 

Required Degree: varied based on level

Required Basic Qualifications: 

• 4-8+ years experience in hands-on system security forensics; malware analysis; reverse engineering; vulnerability assessment; incident response; and/or penetration testing.

• Experience with forensic tools such as EnCase, FTK, NetWitness, WireShark or similar tools.

• Candidate should have a foundation in sound forensic principles, techniques, and processes.

• Advanced understanding of Windows internals and Windows networks including experience analyzing low level Windows details, file locations and registries.

• Experience should include analysis of network traffic and protocols.

• Ability to navigate within a LINUX system as a user to include running scripts and reviewing data.

• Prior experience as a LINUX System Admin is a plus.

• Ability to translate complex technical subjects into business terms for decision makers.

• Experience with and knowledge of typical attack vectors, network exploitation techniques, and exfiltration channels.

• Experience with Yara, OpenIOC, or other host-based signature development

• Experience with Snort or other network-based signature development.

• Experience with one or more programming languages, preferably at least one high level and one low level language. Examples include Python, Java, C, and x86 ASM.

• Penetration testing experience.

 

US Citizenship is Required. 

 

Required Education: varied

Required Responsibilities: 

• Identifying and analyzing software exploits and raw x86 shellcode

• Using a high-level scripting/programming language to extract, deobfuscate, or otherwise manipulate malware related data

• Debugging both user-mode and kernel-mode software

• Providing mitigation suggestions in the context of a security incident, as it relates to the technical analysis of malware or other attack artifacts

• Performing independent research to better understand complex technical problems

• Providing oral briefings on complex technical subjects to senior management and other non-technical audiences 

Desired Certifications/Qualifications: CEH, GREM, Encase 

Desired Education: B.S Information Security, B.S. Computer Science 

Desired Work Experience: 4-8+ years 

 

 

This email is UNCLASSIFIED.

 

 

 

Bob Osgood

Director Computer Forensics and Data Analytics Engineering

ENGR 3255

[log in to unmask]

703-993-5443

http://cfrs.gmu.edu

http://dataanalytics.gmu.edu

 

15-003_GMUunitilogos_VSE_1line4C