Description
Analyze target digital network data to discover, analyze, and document malicious or unauthorized activity using information collected from a variety of SIGINT and computer network defense resources
Analyze metadata collected from tasked communications systems in order to identify, locate, and track targets, and to accurately report the intelligence gained from metadata analysis
Categorize traffic as benign, suspicious, or malicious activity; and document malicious tactics, techniques, and procedures (TTPs)
Develop and implement mitigation strategies Have a network and/or host-based focus
Work Experience
NOTE: Military Multiplier: Relevant military experience is credited as 1.25X years experience!
Master’s degree with 3 years of relevant experience
Bachelor’s Degree with 5 years of relevant experience
Associates degree with 7 years of relevant experience
Specialty Experience
None required
Relevant Experience
Malware analysis
Programming experience in C, C#, C++, Java, Perl, or Python is preferred
CISSP, GIAC GREM or CREA Certification is preferred for level 1
CISSP, CEH, Sec+, Net+, GIAC Reverse Engineering Malware Certification (GREM) and/or CREA Certification is required for Level 2 and 3
Education
Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from accredited college or university
Marquee Defense is an equal opportunity employer (EEO)
All applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.