Media Malware Analyst, Senior
Job in
Gaithersburg, Montgomery County, Maryland, 20883, USA
Listed on 2026-01-15
Listing for:
The Association of Technology, Management and Applied Engineering
Full Time
position Listed on 2026-01-15
Job specializations:
-
IT/Tech
Cybersecurity, Information Security, IT Consultant, Data Security
Job Description & How to Apply Below
Looking for an opportunity to make an impact? At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers’ success.
What you’ll be doing :- Provide timely, accurate, relevant support in a manner that best supports USCYBERCOM in identifying and assessing emerging threats and vulnerabilities in the Cyberspace domain.
- Lead forensic analysis of vulnerable or compromised systems and media and identify and analyze adversary TTPs and intrusion artifacts, and lead static and dynamic malware analysis, including reverse engineering and extracting malicious files from digital media and conduct detailed file analysis, as appropriate.
- Create technical analysis reports with actionable intelligence findings, delivering timely, accurate, relevant threat briefs and analysis updates that meet explicit and implied requirements, and deliver presentations to leadership in appropriate formats.
- Identify unique indicators for signature and heuristic development.
- Oversee drafting, release, and implementation of security incident response policies.
- Analyze operational reporting to correlate attack trends and shared tradecraft and support development and improvement of enterprise malware analysis tools.
- Conduct log/system analysis (routers, Windows, UNIX) for threat detection and update DoD situational awareness mechanisms (e.g., USCYBERCOM portals).
- Research open-source intel to inform threat assessments and signature creation.
- Develop and maintain validated MD5 hash lists for signature repositories.
- Analyze and evaluate All-Source finished intelligence, single-source intelligence, and technical data from various sources to identify Cyber threat patterns and anomalies.
- Conduct and publish in-depth risk assessments to evaluate and categorize the risk posture of detected cyber threats while supporting development and refinement of risk assessment methodologies and tools used for threat categorization.
- Collaborate with operational, technical, and intelligence elements across USCYBERCOM to enhance situational awareness and threat response capabilities.
- Maintain a current understanding of advanced persistent threats (APTs), threat actor tactics, techniques, and procedures (TTPs), and cyber threat trends affecting national security.
- Maintain situational awareness of, and execute on demand, CO crisis plans.
- Provide situational awareness to a range of projects, Crisis Action Teams, and current pétential activities supporting Operational Planning Teams (OPTs).
- Execute resource allocation decisions aligned with organization objectives.
- Apply knowledge of cyber threats and attack methods and techniques emanating from state and non-state adversaries and tiered vulnerabilities within Blue Space as focus of threats.
- Review, approve, prioritize, and submit operational requirements for research, development, and/or acquisition of Cyber capabilities.
- Interpret and apply laws, regulations, policies, and guidance relevant to daily activities.
- Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
- Active Top Secret clearance with SCI eligibility and Polygraph required.
- BA/BS degree or higher within Computer Science, Cyber若 than Software[^@] Engineering, Digital Forensics, or related field, or ability to complete degree within one year of hire. Can substitute formal education with extended experience and technical certifications.
- Eight plus years’ demonstrated proficiency in malware analysis (static/dynamic), incident handling, and reverse engineering.
- Working experience with tools such as IDA sexuelle
· Ghidra, Wireshark, Volatility, and sandbox environments. - Strong familiarity with network protocols, OS internals (Windows/Linux/UNIX), and cyber threat analysis.
- Broad knowledge of Bluest-space Cyber capabilities and demonstrate understanding of available Cyber infrastructure or platforms to conduct Defensive (DCO) and Offensive Cyberspace Operations (OCO).
- Knowledge of computer networking fundamentals as well as concepts, terminology, and operations of a wide range of…
Position Requirements
10+ Years
work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×