Malware Analyst - Expert at Boston Government Services LLC
Washington, DC 20024, USA -
Full Time


Start Date

Immediate

Expiry Date

15 May, 25

Salary

0.0

Posted On

15 Feb, 25

Experience

2 year(s) or above

Remote Job

No

Telecommute

No

Sponsor Visa

No

Skills

Reporting, Threat Analysis, Network Security, Resume, Defense, Trend Analysis

Industry

Information Technology/IT

Description

Boston Government Services LLC. (BGS) is seeking a Malware Analyst (Expert) to support our clients at Department of Energy (DOE) in Washington, DC Area.
BGS is an engineering, technology, and security firm helping to advance missions of national importance for government programs, national laboratories, national security facilities, nuclear operations, and complex projects. We support clients at every stage, from strategic planning and program management to the execution of engineering and technical activities. We work to attract and retain the best talent because the best talent delivers the best results for our clients. Our capabilities are based on our experience in complex, secure, and highly regulated environments. We leverage our experience and capabilities to provide mission-driven solutions tuned to our client’s mission needs and strategic direction.
We are passionate about our culture! At BGS, we hire people who will bring their whole self to work each day because we value operating with openness and inclusivity, welcoming and respecting all. BGS cares for each employee’s well-being by offering a comprehensive benefit package and providing a culture of exciting work, excellence, and fun.
If you align with BGS company values and culture, we would love for you to explore opportunities to join our growing team by checking out the job description below!

REQUIREMENTS:

Resume must reflect the following requirements. Technical field experience weighted more than education in requirements.

  • Coordinate and provide senior level technical support to enterprise-wide cyber defense analysts to resolve cyber defense Incidents.
  • Determine the scope, urgency and impact of cyber defense incidents.
  • Coordinate incident response functions and recommend incident remediation strategies.
  • Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
  • Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and Intrusion Detection System (IDS) logs) to identify possible threats to network security.
  • Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation.
  • Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
  • Track and document cyber defense incidents from initial detection through final resolution.
  • Coordinate with intelligence analysts to correlate threat assessment data.
  • Perform cyber defense trend analysis and reporting.
  • Expert. Ph.D. in a technical field with limited experience or master’s degree in a technical field and 2 to 5 years of related experience or bachelor’s degree in a technical field and 5 to 10 years of related experience or associate’s degree in a technical field and 10 to 15 years of related experience. Requires demonstrated in‐depth knowledge and skills in a technical specialty.
  • Must be U.S. citizen.
  • Successful drug screening.
  • Must be eligible to obtain and maintain a security or clearance badge.

PREFERRED QUALIFICATIONS:

  • An active U.S. Department of Energy (DOE) Q clearance or an equivalent clearance from an agency such as the U.S. Department of Defense (DOD), Top Secret Clearance.
Responsibilities
  • Investigates, analyzes, and responds to cyber incidents within the network environment or enclave.
  • Notify designated managers, and cybersecurity service provider team members of suspected security incidents and communicate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.
Loading...