Company Overview:
Peraton: Delivering innovative solutions for a safer, more secure world by tackling the most complex challenges. We think differently, bringing together top talent and technology to transform what’s possible. Join us in achieving the extraordinary.
Important Security Notice:
Be vigilant against recruitment fraud. Our official career site is careers.peraton.com, and our corporate site is peraton.com. We will never ask for sensitive personal information early in the application process. Learn more about avoiding scams: https://careers.peraton.com/recruitment-fraud/
Malware Analyst – Uncover Advanced Threats (Fort Huachuca, AZ)
About Peraton:
Peraton is a leading national security company dedicated to solving critical global challenges. We deliver innovative IT and mission capabilities across all domains to protect our nation and allies. Join our team and achieve the extraordinary.
The Role:
As a Malware Analyst, you will be at the forefront of analyzing sophisticated malicious code. You’ll leverage advanced tools like disassemblers, debuggers, and network sniffers to dissect malware, identify its capabilities, and develop effective mitigation strategies. Your research will contribute to our understanding of emerging threats, vulnerabilities, and exploitation techniques, ultimately enhancing our defensive cyber operations.
Responsibilities:
- Lead and participate in the detailed evaluation and analysis of complex malicious code.
- Utilize tools such as disassemblers, debuggers, hex editors, unpackers, virtual machines, and network sniffers.
- Provide comprehensive technical reports detailing malware characteristics, identification parameters, advanced capabilities, and mitigation strategies.
- Conduct in-depth research on malicious software, vulnerabilities, and exploitation tactics.
- Apply your expertise in application security, network security, reverse engineering, and malware analysis.
- Demonstrate strong knowledge of various malware types (worms, viruses, Trojans, rootkits, botnets), Windows internals, and the Win32 API.
- Utilize extensive programming (assembly and web) and system analysis skills with tools like IDA Pro, Ollydbg, PCAP tools, and TCP Dump.
Qualifications:
Basic:
- Active Top-Secret/SCI clearance.
- Minimum 8 years with BS/BA; 6 years with MS/MA; or 3 years with PhD.
- GIAC Certified Forensic Analyst (GCFA) certification.
- Possess DoD 8570.01-M IAT Level II Baseline Certification.
- Ability to obtain ITIL Foundations Certification within 90 days of hire.
- Comprehensive understanding of all aspects of Defensive Cyber Operations.