Peraton Overview Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our 22,000 employees do the cant be done, solving the most daunting challenges facing our customers.
We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law.
As a government contractor, Peraton abides by the following provision
Pay Transparency Nondiscrimination ProvisionThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of the other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractors legal duty to furnish information. 41 CFR 60-1.35(c).
Qualifications Labor Category Qualifications (REQUIRED):- Minimum 10 years of experience as a Malware Analyst
- Minimum of Bachelors Degree from an accredited college or university in Computer Engineering, Computer Science, Cybersecurity, Computer Engineering, or related discipline
- A minimum of DOD 8140/DOD 8570 IAM Level III Certification, CSSP Manager
- Strong attention to detail and organizational skills. Excellent communications skills
Additional Capabilities Required: N/A
- Understands source code, hex, binary, regular expression, data correlation, and analysis such as firewall, network flow, and system logs
- Experience employing engineering techniques and processes to analyze software to identify vulnerabilities
- Coordinates effort to develop and analyze cyberspace operations, DCO, Computer Network Exploitation (CNE), and OCO solutions
Additional Capabilities Desired:- Knowledge of Metasploit, x86, x64, penetration testing, python, reverse engineering, BSides organizer, and Capture the Flag competition
Responsibilities Job Description: Candidate will support the Media Malware Analysis (MMA) efforts required for delivery of malware products as part of the effort to analyze and report on malware in support of and cyberspace operations. While representing USCYBERCOM, the candidate will facilitate SSP development and certification and accreditation support for new malware analysis systems; support operations oversight and governance for malware throughout the DODIN; performs system analysis, reverse engineering, and static, dynamic, and best-practice malware analytics methodologies; understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.); possess malware and programming skills to include C/C++ and assembly language, and high-level understanding of malware impacts to operating systems.
Labor Category Description:- Possesses senior-level experience as a Malware Analyst with a background in cutting-edge cyberspace technologies
- Applies knowledge on subjects relating to the conduct of Malware Analysis activities through governance and business practices
- Works under consultative direction toward predetermined Mission Assurance goals and objectives; assignments are often self-initiated
- Develops design specifications by inspection and analysis to offset various malware and to protect and defend USCYBERCOM infrastructure
- Develops, researches, and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption
- Conducts vulnerability assessments/penetration tests of information systems; creates malware detection topologies
- Performs in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM
- Often and without source code or documentation, performs system analysis, reverse engineering, and static, dynamic, and best-practice malware analytics methodologies and analysis on Windows, Android, or UNIX-based platforms
- Possesses comprehensive knowledge of programming skills especially including C/C++ and Assembly language, Windows internal C/C++ and either UNIX/Linux or mobile (Android) platform, malware and things related to malware research and analysis, reverse engineering, vulnerability analysis, exploit development, and related disciplines