Get new similar jobs by email for

Cyber Specialist/Intermediate ...

By continuing you agree to Monster's Privacy policy, Terms of use and use of cookies.

Alexa Strategies


Job Summary

Alexa Strategies
Washington, DC 20036
Job Type
Full Time
Education Level
Career Level
Experienced (Non-Manager)
Job Reference Code
Contact Information
Alexa Strategies
Alexa Strategies

Cyber Specialist/Intermediate Reverse Engineer

About the Job

Description: Cyber Specialist/Intermediate Reverse Engineer

Would you like to perform rewarding work while contributing to the success of an established, growing company? Alexa Strategies is seeking a Cyber Specialist/Intermediate Reverse Engineer with expertise in knowledge of industry accepted standards and best practices related to incident response operations, while demonstrating knowledge in information technologies to include computer hardware and software, operating systems, and networking protocols. The applicant must have a working knowledge of hacker tactics, techniques and procedures (TTP) and a demonstrated excellence in analytical and problem solving skills, analyzing malicious code and reverse engineering in support of customers. You should be able to design, prototype, document, mature, and transition malicious code analysis methods and tools appropriate for operational use. You will create and track investigations to resolution and compose security alert notifications. You will work with and advise incident responders in the steps to take to investigate and resolve computer security incidents, as well as staying up to date with current vulnerabilities, attacks, and countermeasures.

As a Cyber Specialist/Intermediate Reverse, you will have significant interaction with the Federal Government and contractor staff on the Network and Information Assurance (IA) teams. This position requires the ability to to multitask and give equal attention to a variety of functions while under pressure. The work location is in the Washington, D.C. area.

Responsibilities include:

1. Contractor shall provide core hour support (0630hrs – 1800hrs) or as required due to threat activity per leadership’s requirements.

2. Malware Analysis Support to:

  • Examine malicious software/capabilities to identify the nature of the threat; Reverse-engineer the compiled executable code to examine how the program interacts with its environment
  • Analyze collected media for understand adversary technical capabilities and Tactics, Techniques and Procedures (TTP)/methods of employment
  • Analyze the attack/exploit capability of the software, document and catalog findings for future correlation
  • Provide all pertinent finding to personnel responsible for the development of signatures capable of detecting the analyzed malware as it propagates on infected systems
  • Works and interacts directly with cybersecurity professionals internally within/external to the organization, with Law Enforcement/Counter Intelligence LNO's, and intelligence professionals as a technical specialist to understand higher-level adversary capability
  • Document, update and enhance processes and procedures by producing training materials, standards documents and reports
  • Contractor employees will possess exceptional knowledge/experience with commercial binary analysis tools including but not limited to: IDA PRO disassembler, Ollydbg
  • Contractor employees will have familiarization with additional analysis tools including but not limited to IceSword, Procmon, Analyst Notebook, etc, Contractor employees will be proficient and have experience with computer languages including but not limited to: Assembly, C, C++, Perl, Java, Python, etc.

3. Forensic Analysis Support to Enterprise Security Operations Center and subordinate incident management teams:

  • Collect, preserve, and transfer forensic evidence of unauthorized access to a military/partner network, device or information systems
  • Analyze forensically sound images to identify suspicious/malicious files, all intrusion related artifacts, and entry points/attack vectors
  • Develop necessary procedures or scripts to identify such data
  • Contractor employees will possess exceptional knowledge/experience/certification with commercial computer forensic tools including but not limited to: EnCase Forensic, EnCase Enterprise / Cybersecurity, AccessData Forensic Tool Kit(FTK), AccessData Lab, etc
  • Contractor employees will have strong working knowledge / experience with all Windows OS platforms including but not limited to: Vista, Windows 7, Windows 8, 2K3 Server, 2K8 Server, etc
  • Contractor employees will have working knowledge / experience with varying flavors of Unix/Linux, and Apple based operating systems
  • Contractor employees will possess strong experience with obtaining forensically sound images of, but not limited to, workstations, servers, laptops, flash devices, removable media, cell phones, RAID, virtual systems, etc

Skills/Qualifications: Must possess an active Top Secret clearance with SCI eligibility. 3-7 yrs experience working in a computer emergency response organization or on an incident response team. Solid incident analyst skills to support incident management through malicious code review and reverse engineering. Possess skills in multi-tasking and coordinating with multiple business groups. Familiarization with information security policies and procedures; possess good communication and problem solving skills. Able to communicate with different technical teams and levels of leadership.

One of the following certifications: GCIH, CEH, GCFA, and one of the following: CISSP, GSLC, CISA, CISM GSNA, CSIH

It is Alexa Strategies’ policy to promote equal employment opportunities


Job Tools

  • Print
  • Share
  • Report this job