- UpvoteDownvoteShare Job
- Suggest Revision
The candidate for this position should have experience supporting a broad-range of programs associated with overall information assurance and cyber security support; inclusive of security configuration and management services, data protection, anti-virus, malware detection and protection, host-based and endpoint security solutions, and audit and accountability services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Qualifications: Minimum 5+ years of comparable experience performing Incident Response, Forensics, Malware Analysis, or Penetration Testing Must be proficient in at least three of the following disciplines: Network traffic analysis and host based log analysisComprehensive understanding of enterprise Endpoint security productsStatic and Dynamic malware analysisDisk and Memory forensicsPractical knowledge in at least one scripting or development language (e.g. PowerShell or Python.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
4+ years experience in conducting host and network forensics, log analysis and malware triage in support of incident response investigations as an incident analyst or as a member of a red team.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding and experience with network and security architecture, multiple operating system platforms, databases, web applications, and other evolving mobile and cloud technologies, to include but not limited to the following: malware inspection, traditional and application layer firewalls, VPN, identity management systems, data loss prevention, and network and host-based intrusion detection/prevention systems.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Preferably possess one or more of the following technical certifications: GIAC Certified Incident Handler (GCIH), GIAC Certified Forensics Analyst (GCFA), or GIAC Reverse Engineering Malware (GREM), EC-Council Certified Security Analyst.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Assumes responsibility for all COMSEC inventory issued to include In Line Network Encryptors (INE) encryption equipment that is used or deployed at SMIT locations including remote sites, CONUS, and OCONUS. This includes implementations that are part of DSTB, Very Small Site Design (VSSD), Surge Kits, Executive Communication Kits, NMCI-managed encryption device at other sites, and any future solutions that use crypto devices.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge across all critical elements and common data types used in threat intelligence analysis, including malware used in targeted adversary campaigns; host and log forensics including methods of data collection and analytic techniques; and network forensics including common protocols and how those are used in adversary operations.
$94,300 - $182,600 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, including but not limited to volatile and non-volatile memory and/or system artifact collection and analysis.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct exploratory and in-depth analysis of network traffic from security devices, analysis of host-based audit logs, malware analysis, trending of cyber incident reports, correlation of classified and open-source threat reporting, and linkages/integration with other agencies.
ExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The client distinguishes itself from other Microsoft Office add-ins by having an intuitive user interface, smart algorithms that automate many tasks and, not least, a deep integration into its Office host application.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with host-centric tools for forensic collection and analysis (SleuthKit, Volatility Framework, FTK, Encase, etc.) Demonstration of leadership abilities across threat environments as well as a strong comprehension of cloud security, malware, emerging threats and calculating risk will be critical to success.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Requires demonstrated understanding and experience with network and security architecture, multiple operating system platforms, databases, web applications, and other evolving mobile and cloud technologies, along with the following: malware inspection, traditional and application layer firewalls, VPN, identity management systems, data loss prevention, and network and host-based intrusion detection/prevention systems.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Participate in cyber incident response investigations requiring forensic, malware, and log analysis, and analyze forensic images and triage datasets to identify indicators of compromise, lateral movement, and unauthorized access or exfiltration of data.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leidos is seeking a COMSEC Specialist to support efforts for the Service, Management, Integration and Transport (SMIT) Contract; supporting the largest IT services program for the Navy. Under the SMIT Contract, the Leidos team will deliver the core backbone of the Navy-Marine Corps Intranet, including cybersecurity services, network operations, service desk, and data transport.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations. As a Security Consultant, you could work on engagements including assisting clients in navigating technically complex and high-profile incidents, performing forensic analysis, threat hunting, and malware triage.
$128,000 - $192,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday
malware host jobs
FEATURED BLOG POSTS
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.
Technology in the Workplace: How to Improve your HR Function with AI
It’s safe to say that the last two years have brought fundamental changes to the way we work and do business. Companies have relied on technology in the workplace to digitize their services and build a remote-friendly infrastructure that could prepare them for the future.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.
4 Things to Consider When Building a Global Workforce
The rise of remote work has given employers a unique chance to rethink how they approach workforce management. This ranges from rethinking the size and design of their office space to updating their tech stack to accommodate different working styles. It has created new opportunities for companies of all sizes to expand their hiring pool and look for top talent on a global scale.