What are the responsibilities and job description for the Cyber Operations Malware Analyst - Senior position at @Orchard?
Job Description
Job Description
Cyber Operations Malware Analyst - Senior Fort Knox KY or Remote
Active TS / SCI SSBI Clearance Required @Orchard is supporting a growing Federal contractor with multiple needs for an experienced Cyber Operations Malware Analyst. The individual in this role will lead and participate in evaluation and analysis of complex malicious code through utilization of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers. They will be responsible for conducting research on malicious software, vulnerabilities, and exploitation tactics, providing findings in technical reports with details of malware, identification parameters, advanced capabilities, and mitigation strategies.
As the Cyber Operations Malware Analyst you will :
- Provides support for defensive cyberspace operation by reviewing and evaluating network traffic, and identifying baselines to facilitate locating adverse network trends, anomalous traffic, or malicious cyberspace activity.
- Supports network analysis by performing hunting, clearing, hardening, and continual assessment operations as well as providing Cyber Threat Emulation (CTE) and Discovery and Counter-Infiltration (D&CI) capabilities.
- Provides surge support, technical guidance, and expertise in the areas of Cybersecurity to support Customer, Mission Partners, IMOs, ISSOs, IS Owners, Software Developers, Network System, and Database Administrators IAW all related cyber regulations and directives; provide results in reports, briefs, and deliverables as required to the appropriate Government representative.
- Provide Cybersecurity surge support in the event of real world or additional requirements in support of RMF compliance checks and documentation review across authorization boundaries, including, but not limited to :
Perform security review preparation for all security controls associated with RMF applicable to an assigned authorization boundary based upon the Confidentiality, Integrity, or Availability designation.
Requirements :
Application security, network security, reverse engineering, or malware.
Established in 2010, @Orchard has an exceptional reputation, providing staffing solutions to time-sensitive, talent scarcity issues to deliver better talent management ROI. Our specialty lies in the critical area of program talent acquisition and resource management, not in one narrow skillset, but across many areas of technical and functional delivery. To learn more about our other exciting opportunities, visit our Jobs Page at www.atorchard.com .