Cyber Mobile Threat Analyst - MDM/Blackberry

  • CSRA,
  • Rosslyn, VA
company banner
CSRA
Analysis, Analyst, Android, CCIE, CISSP, Development, iOS, Java, Linux, Management, Programming, Python, Research, Security, Testing, Windows
Full Time
Telecommuting not available Travel not required

Job Description



Cyber Mobile Threat Analyst – MDM/Blackberry
All times are in Eastern Daylight Time.



Requisition ID
2016-11699
Job Locations
US-VA-Rosslyn


Posted Date
10/27/2016
Category
Information Technology

Clearance Level Must Currently Possess
Yes- Interim Secret required to start
Telecommuting Options
Telecommuting Not Allowed

Clearance Level Must Be Able to Obtain
TS/SCI
Opportunity Details:

Overview:




As the largest pure-play IT services provider serving the U.S. government sector, CSRA is where you can come to be successful. Join a collaborative team, solving customer issues and accessing an array of resources for your success. Take advantage of tremendous opportunities as you help us chart our path to industry leadership, and tap into our collective 90+ year heritage. With combined FY15 revenues of approximately $5.5 billion and nearly 19,000 employees, CSRA represents the coming together - figuratively and literally - of two outstanding companies: the North American Public Sector business of CSC and SRA. Join us and watch your career take flight. CSRA is seeking a Senior Mobile Security Analyst to support our Department of State client. This is a unique and challenging opportunity in the Cyber Threat Analysis Division and Technical Analysis and Special Operations Branch (TASO). TASO is a technical analysis group and is the last stop for many challenging technical security issues within the organization.This person needs to be experienced, inquisitive and able to research new highly technical subjects. Perform analysis of mobile devices, and host and network logs to identify malicious Advanced Persistent Threat (APT) activity. Perform digital forensics on media associated with compromised hosts to assess the scope and nature of intrusions. Identify and dissect highly targeted attacks and other suspicious activity using a variety of network based tools. Provide accurate and rapid reporting of in-depth technical analysis results in written form. Works independently and provides mentorship to junior technical staff as needed.

Responsibilities:






  • Identify threats to the Department from the mobile platform

  • Research/Deep Dive into potential exploitation methods

  • Provide recommendations to operate with the most secure technical configurations and settings for mobile devices

  • Identify and analyze Network Security appliance logs

  • Hunt for activity that is not normally detectable through security appliances

  • Provide mitigation suggestions in the context of a security incident, as it relates to the technical analysis of malware or other attack artifacts

  • Perform independent research to better understand complex technical problems

  • Provide oral briefings on complex technical subjects to senior management and other non-technical audiences

  • Build and lead a team of analysts focused on mobile threat analysis and mobile security concerns

Qualifications:




Required Experience: 5 years experience with: Mobile Threat Analysis

  • Real-world experience with top MDM solutions

  • Strong background in Security Event Analysis

  • Experience testing security of MDM configurations

  • Experience performing Mobile malware analysis

  • Experience working with Blackberry, Android, and IOS
Desired Experience: 2 years experience with one of the following is desired:Network Forensics Analysis

  • Experience with log correlation utilities like SPLUNK or Elastic Search

  • Experience reviewing network traffic logs to identify malicious activity

  • Experience reviewing and hardening network configurations

  • Experience with Snort or other network-based signature development

  • Monitoring using commercial tools

  • BRO scripting experience is a big plus
Static Binary Analysis

  • Use of industry standard tools

  • Experience with one or more programming languages, preferably at least one high level and one low level language. Examples include Python, Java, C, and x86 ASM

  • Proficient with analysis/triage of Windows malware to obtain technical indicators
Dynamic Binary Analysis

  • Experience with Disassemblers and Debuggers

  • Proficient with analysis/triage of Windows malware to obtain technical indicators
Host Forensic Analysis

  • Experience with tools like EnCase, FTK, Volatility

  • Experience with Yara, OpenIOC, or other host-based signature development

  • Experience across multiple platforms (Windows, Linux, Mac, iOS, Android)
Desired Certifications:CISSP, CEH, GREM, EnCE, CCIE-SecurityDesired Education:MS or BS in: Computer Engineering, Computer Science, Electrical Engineering, Information Technology, Computer Forensics or related field, or appropriate amount of direct experience to match responsibilities and qualifications.You can start with an Interim Secret clearance and we will process you to the TS/SCI level.#cjobs #dicepost #Gdjobs

Notice:




CSRA is an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.


Company Information

What We Do. CSRA is tomorrow’s thinking, today. To "Think Next. Now." is to imagine a better future and to deliver it, today. For our customers, our partners, and ultimately, all the people our mission touches, CSRA is realizing the promise of technology to change the world through next-generation thinking and meaningful results. We understand that our customers' missions require new methods and imaginative thinking. We bring together government IT professionals, emerging technologies, and the brightest, cutting-edge advisors in the industry to deliver a broad range of innovative, next-generation IT solutions and professional services to help our customers modernize their legacy systems, protect their networks and assets, and improve the effectiveness and efficiency of mission-critical functions for our warfighters and our citizens. Our Company. CSRA's legacy is a partnership that began when the North American Public Sector business of CSC and SRA International merged to become a leading provider of next-generation IT solutions and professional services with over 50 years of combined legacy experience supporting U.S. government agencies and programs. We retain the spirit of partnership in all we do—with our customers, within our brilliant teams, and through our alliances with industry-leading technology innovators. We are a company of 18,000+ smart, talented individuals, yet we enjoy a start-up culture that inspires us to make a difference while delivering results in this rapidly evolving world. Together, we are committed to a stronger and better future for America through next-generation thinking made real today. Think Next. Now.
Dice Id : srabot
Position Id : 3396846

Similar Positions at CSRA

Senior Malware Analyst (Cyber)
  • Beltsville, MD
  • 19 hours ago
Cyber Security Engineer
  • Rosslyn, VA
  • 19 hours ago
Senior Cyber Security Team Lead
  • Rosslyn, VA
  • 19 hours ago
Cyber Security Engineer Sr
  • Beltsville, MD
  • 19 hours ago
Cyber Systems Administrator Associate
  • Beltsville, MD
  • 19 hours ago
Senior Cyber Security Engineer
  • Arlington, VA
  • 19 hours ago
Mid-Level Cyber Analyst (CIRT)
  • Beltsville, MD
  • 19 hours ago
Cyber Security Scanning Engineer
  • Rosslyn, VA
  • 19 hours ago
Senior Cyber Security Engineer-IDS
  • Beltsville, MD
  • 19 hours ago
Advertisement