Responsibilities
We are seeking a highly skilled and innovative Malware Analyst to join our team in the greater DMV area supporting the Army National Guard.
Responsibilities
- Perform static and dynamic malware analysis to identify functionality persistence mechanisms indicators of compromise and adversary techniques.
- Deobfuscate code inspect binaries and execute controlled sandbox detonations to observe malware behavior and system/network interactions.
- Extract validate and format IOCs and behavioral signatures for ingestion by detection engineering SOAR playbooks and threatintelligence platforms.
- Document analysis workflows results and mitigation recommendations in technical reports to support incident response and remediation.
- Collaborate with senior analysts to refine reverseengineering methods tooling and repeatable analysis pipelines.
- Support SOC/CIRT investigations by providing timely technical context evidence artifacts and analytic inputs for containment and eradication.
- Contribute to knowledge sharing playbook updates and training resources to improve team analytic capability and consistency.
#ENOCS
Qualifications
Qualifications
- 2 years with BS/BA; 0 years with MS/MA; 6 years with no degree
Clearance: Active TS/SCI clearance.
Candidate must meet ONE of the following:
- Bachelors degree in Computer Science Cybersecurity Data Science Information Systems Information Technology or Software Engineering; OR
- Relevant DoD/military training (documented reverse engineering or malware analysis coursework); OR
- Relevant professional certification or equivalent experience (examples: RCCE Level 1; CHFI).
Required experience and skills:
- Malware analysis reverse engineering or incident response experience in enterprise or DoD contexts.
- Handson proficiency with static analysis tools (IDA Pro Ghidra) dynamic analysis/sandboxing (Cuckoo REMnux) and binary/PE/ELF analysis techniques.
- Familiarity with malware unpacking decryption API/IOC extraction memory forensics and common obfuscation/packing methods.
- Ability to produce clear reproducible analysis artifacts (YARA rules IOCs behavior profiles) and communicate findings to technical teams.
- Basic scripting/programming skills (Python C/C or assembler) for tooling automation and analysis tasks.
Desired:
- Prior DoD/ARNG or classifiedenvironment malware analysis experience.
- Experience integrating analysis outputs into detection engineering threat intel platforms and SOAR playbooks.
- Advanced certifications or coursework in reverse engineering malware forensics or related GIAC/ICS credentials.
#ENOCS
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.
Target Salary Range
$80000 - $128000. This represents the typical salary range for this position. Salary is determined by various factors including but not limited to the scope and responsibilities of the position the individuals experience education knowledge skills and competencies as well as geographic location and business and contract considerations. Depending on the position employees may be eligible for overtime shift differential and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer including disability and protected veterans or other characteristics protected by law.
Required Experience:
IC
ResponsibilitiesWe are seeking a highly skilled and innovative Malware Analyst to join our team in the greater DMV area supporting the Army National Guard.ResponsibilitiesPerform static and dynamic malware analysis to identify functionality persistence mechanisms indicators of compromise and adversa...
Responsibilities
We are seeking a highly skilled and innovative Malware Analyst to join our team in the greater DMV area supporting the Army National Guard.
Responsibilities
- Perform static and dynamic malware analysis to identify functionality persistence mechanisms indicators of compromise and adversary techniques.
- Deobfuscate code inspect binaries and execute controlled sandbox detonations to observe malware behavior and system/network interactions.
- Extract validate and format IOCs and behavioral signatures for ingestion by detection engineering SOAR playbooks and threatintelligence platforms.
- Document analysis workflows results and mitigation recommendations in technical reports to support incident response and remediation.
- Collaborate with senior analysts to refine reverseengineering methods tooling and repeatable analysis pipelines.
- Support SOC/CIRT investigations by providing timely technical context evidence artifacts and analytic inputs for containment and eradication.
- Contribute to knowledge sharing playbook updates and training resources to improve team analytic capability and consistency.
#ENOCS
Qualifications
Qualifications
- 2 years with BS/BA; 0 years with MS/MA; 6 years with no degree
Clearance: Active TS/SCI clearance.
Candidate must meet ONE of the following:
- Bachelors degree in Computer Science Cybersecurity Data Science Information Systems Information Technology or Software Engineering; OR
- Relevant DoD/military training (documented reverse engineering or malware analysis coursework); OR
- Relevant professional certification or equivalent experience (examples: RCCE Level 1; CHFI).
Required experience and skills:
- Malware analysis reverse engineering or incident response experience in enterprise or DoD contexts.
- Handson proficiency with static analysis tools (IDA Pro Ghidra) dynamic analysis/sandboxing (Cuckoo REMnux) and binary/PE/ELF analysis techniques.
- Familiarity with malware unpacking decryption API/IOC extraction memory forensics and common obfuscation/packing methods.
- Ability to produce clear reproducible analysis artifacts (YARA rules IOCs behavior profiles) and communicate findings to technical teams.
- Basic scripting/programming skills (Python C/C or assembler) for tooling automation and analysis tasks.
Desired:
- Prior DoD/ARNG or classifiedenvironment malware analysis experience.
- Experience integrating analysis outputs into detection engineering threat intel platforms and SOAR playbooks.
- Advanced certifications or coursework in reverse engineering malware forensics or related GIAC/ICS credentials.
#ENOCS
Peraton Overview
Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the worlds leading mission capability integrator and transformative enterprise IT provider we deliver trusted highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land sea space air and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day our employees do the cant be done by solving the most daunting challenges facing our customers. Visit to learn how were keeping people around the world safe and secure.
Target Salary Range
$80000 - $128000. This represents the typical salary range for this position. Salary is determined by various factors including but not limited to the scope and responsibilities of the position the individuals experience education knowledge skills and competencies as well as geographic location and business and contract considerations. Depending on the position employees may be eligible for overtime shift differential and a discretionary bonus in addition to base pay.
EEO
EEO: Equal opportunity employer including disability and protected veterans or other characteristics protected by law.
Required Experience:
IC
View more
View less