- UpvoteDownvoteShare Job
- Suggest Revision
Strong analytical and technical skills in computer network defense operations, ability to lead efforts in Incident Handling (Detection, Analysis, Triage), Hunting (anomalous pattern detection and content management) and Malware Analysis.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Own your career as a Cyber Malware Reverse Engineer at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. As a Cyber Malware Reverse Engineer you will help ensure today is safe and tomorrow is smarter.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Applicants must have at least 5 years of experience working within a defense contractor and have a thorough understanding of Defense Contract Audit Agency (DCAA) accounting practices for cost-type contracts.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate will support multiple aspects of the Agency’s digital forensic analysis of observed or suspected malware samples/evidence and investigate computer security incidents to include insider threat investigations.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ability to communicate and collaborate with various audiences from technical analysts (e.g., malware analysts, Cyber Threat Intelligence (CTI) analysts, Incident Response (IR) and Cyber Hunt analysts), to academic researchers, to business and functional managers and leaders, to senior executives in both the public and private sectors.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Utilize endpoint protection systems to manage intrusion detection / intrusion protection functions, malware defense, application control policies, and related controls; investigate and respond to anomalies; and provide end-user support related to endpoint operation and use.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Translate threat intelligence into actionable insights for enhancing cyber defense strategies. Proficiency in security tools and technologies, including intrusion detection systems, SIEM, network monitoring, and malware analysis.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Phia, LLC is a Northern Virginia-based, small business established in 2011 with a focus on Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, and Information Assurance/Security.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Have strong experience with security monitoring, threat hunting, packet analysis, malware analysis, signature development. With more than twenty years of securing some of the U.S. Department of Defense and the Intelligence Community's most critical networks, JFL Consulting, LLC provides advanced network security solutions to a range of US Government and US commercial clients.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Defense, Cybersecurity, Malware, MITRE ATT&CK Framework, Reverse Engineering. Required Certifications: 8570 IAT II prior to start date; must obtain CSSP Analyst, GIAC Reverse Engineering Malware (GREM) or equivalent, within first 120 days of employment.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience and/or familiarity with the following network protection devices: Firewalls, intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow, and packet analysis.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Title: Cyber Security Project Engineer Location: Chantilly, VA Clearance: Active TS/SCI w/ Polygraph needed to apply Company Overview: Cornerstone Defense is the Employer of Choice within the Intelligence, Defense, and Space communities of the U.S. Government.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You can translate investigative capabilities into effective automation, instrumentation, and tooling, based on an understanding of how analysts need to synthesize disparate sets of data from sources such as malware, cyber attack patterns, and closed and open-source intelligence.
Part-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Network Security Engineers interact daily with a wide variety of industry leading network security products including, but not limited to, firewalls, Intrusion prevention systems, full packet capture solutions, mail gateways, advanced malware defense systems, and TLS inspection solutions.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Whether you're fueled by a passion for Firmware or Kernel-level development, relish crafting OS/Network/Application designs, specialize in vulnerability and malware analysis, or excel in Reverse Engineering, IO, and CNO technology development, we encourage you to explore the possibilities of joining our ever-expanding team.
ExpandApply NowActive JobUpdated 6 days ago
malware defense jobs in Vienna, VA
FEATURED BLOG POSTS
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.