• Type: Contract
  • Job #1708


Title: Cyber Security Forensics Specialist
Location: Herndon, VA
*Clearance: Active TS/SCI w/ Polygraph needed to apply *



Company Overview:

Cornerstone Defense, in partnership with our military, intelligence, and civil government customers, supports U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone’s Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team specializes in software development, cloud architecture, systems and network engineering, systems integration, agile management, as well as targeting operations and intelligence analysis. Our support to our mission customers includes cyber network operations, exploitation and defense, signals intelligence, human intelligence, and critical missions and networks.




The ideal candidate will support overall network defense activities, provide in-depth analysis of suspected malicious code and/or infected systems and network devices, perform necessary inspection and reverse-engineering activities to understand the behavior of the software, the root cause for its presence, and develop recommendations on how to counter the threat.


Responsibilities include, but are not limited to:

  • Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of static and dynamic malware analysis tools, including disassemblers, debuggers, virtual machines, hex editors, and un-packers.
  • Perform research in the area of malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive actions.
  • Conduct reverse-engineering for known and suspected malware files. Investigate instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration.
  • Produce reports detailing attributes and functionality of malware, and indicators that can be used for malware identification/detection, to include behavior, identified infrastructure used for command and control, and mitigation techniques. Analyze the relationship between a given sample of malware and other known samples/families of malware, and notable features that indicate the origin or sophistication of the malware and its authors.
  • Develop network and host-based signatures to identify specific malware. Recommend heuristic or anomaly-based detection methods.
  • Provide subject matter expertise in the detection, analysis and mitigation of malware, trends in malware development and capabilities, and proficiency with malware analysis capabilities.
  • Support the maintenance of malware analysis platforms and tool sets, identify requirements for new malware analysis capabilities, and contribute to the development of new malware analysis tools and techniques.


Basic Qualifications

  • Bachelor's degree in computer engineering, computer science, or other closely related IT discipline.
  • Minimum of 10 years of progressively responsible experience in cyber security, incident response, forensic investigations, with at least a minimum 8 years of experience specifically conducting cyber forensic investigation independently.
  • Two years of experience leading a team of cyber forensic examiners
  • Strong analytical and problem-solving skills.
  • Good interpersonal, organizational, writing, communications, and briefing skills.
  • Cyber Security Forensic Specialist – IAT Level III or CND-IR certifications


Required Experience/Skills:

  • Minimum of four years’ experience in technology/tools specific to the target platforms.
  • Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and Open Source tools like OllyDbg.
  • Understanding of behavioral based threat models like Cyber Kill Chain, etc.
  • Familiarity with Linux OS and mobile iOS/Android forensics.
  • Demonstrated experience writing code (C, C++, Python, Perl, Java, Powershell, Assembly language, etc.)
  • Capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders.
  • Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques.
  • A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats.
  • Understanding of software engineering methodologies.
  • Ability to analyze shellcode, and packed and obfuscated code, and their associated algorithms.
  • Understanding of common attacker methodologies and exploit techniques.
  • Capable of Python scripting to automate analysis and reverse engineering tasks.
  • Strong understanding of network protocols and networking concepts.
  • Strong understanding of Windows Operating System Internals and Windows APIs.
  • Strong understanding of the PE file format and experience parsing structured or unstructured data.
  • Good interpersonal, strong initiative, problem solving, organizational, writing, communications, and briefing skills.


Required Tools:

  • IDA Pro, Debbugers, disassemblers, virtual machines, hex editors, and un-packers, X-Ways and Open source methods and tools to perform malware forensic investigations.


Security Clearance Requirements:

  • TS/SCI /with Polygraph


Equal Opportunity Employment
Cornerstone Defense is proud to be an Equal Opportunity Employer. We are committed to creating an inclusive working environment for all employees and to upholding diversity in our recruiting and hiring processes. All qualified applicants will receive equal consideration for employment without regard to sex, gender identity, sexual orientation, race, color, age, religion, national origin, physical or mental disability, protected Veteran status, or any other characteristic protected by law.



Attach a resume file. Accepted file types are DOC, DOCX, PDF, HTML, and TXT.

We are uploading your application. It may take a few moments to read your resume. Please wait!