We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Malware Analyst/Reverse Engineer with Active Top Secret

Peraton
United States, Virginia, Arlington
Apr 18, 2025

Malware Analyst/Reverse Engineer with Active Top Secret
Job Locations

US-VA-Arlington


Requisition ID
2025-156222

Position Category
Cyber Security

Clearance
Top Secret/SCI



Responsibilities

Peraton is looking for an experienced Malware Analyst/Reverse Engineer in support of the TASO mission with our DSCM program supporting the Department of State.

Location: Arlington, VA; On-site, daily requirement.

The Cyber Threat Analysis Division's (DS/CTI/CTAD) Technical Analysis and Special Operations (TASO) team performs advanced cyber threat network hunting, advanced technical analyses (e.g. analysis of malicious code, network traffic, and Web log data), and forensic review of hard drives, mobile devices, and other storage media.

What you'll do:

    Perform Dynamic and static analysis of malware, or suspected malware, to determine functionality and capability.
  • Perform behavioral analysis through sand-boxing and leveraging virtual machines to simulate enterprise environments.
  • Reverse engineer malware samples through the use of debugging tools.
  • Provide a written technical report related to the scope, nature, and characteristics of identified malicious code. Identify malware IOCs, TTPs and recommend appropriate counter measures.
  • Perform advanced network threat hunting to detect malicious or suspicious behavior on Department on-premise and cloud-based networks.
  • Respond to security events received from CIRT and provide comprehensive findings and recommended remediation steps.

#DSCM



Qualifications

Minimum requirements:

  • Bachelor's degree and a minimum of 9 years' total cyber experience, with 5 of those years' specific to Malware, required. An additional 4 years' of relevant Malware experience will be considered in lieu of the degree requirement.
  • Possess ONE of the following CERTS:
    • CCNA-Security, CND, CySA+, GICSP, GSEC, Security+ CE, SSCP.

  • Demonstrated experience performing static and dynamic analysis techniques.
  • Experience using sandbox and other simulated networked environments for analysis.
  • Demonstrated strong critical, creative, and analytical thinking skills.
  • Expertise in discovering, analyzing, diagnosing, and reporting on malware events, files and network intrusion and vulnerability issues.
  • Ability to recommend sound counter measures to malware and other malicious type code and applications which exploit customer communication systems.
  • Experience developing technically detailed reports that translate complex technical information to non-technical audiences.
  • U.S. citizenship required.
  • An active Top Secret security clearance.
    • Ability to obtain a final Top Secret/SCI security clearance.


Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can't be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we're keeping people around the world safe and secure.



Target Salary Range

$146,000 - $234,000. This represents the typical salary range for this position based on experience and other factors.


EEO

EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Applied = 0

(web-77f7f6d758-2q2dx)