Title: Cyber Security Forensics Specialist Location: Herndon, VA *Clearance: ActiveTS/SCI w/ Polygraph needed to apply *
Cornerstone Defense, in partnership with our military, intelligence, and civil government customers, supports U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone’s Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team specializes in software development, cloud architecture, systems and network engineering, systems integration, agile management, as well as targeting operations and intelligence analysis. Our support to our mission customers includes cyber network operations, exploitation and defense, signals intelligence, human intelligence, and critical missions and networks.
The ideal candidate will support overall network defense activities, provide in-depth analysis of suspected malicious code and/or infected systems and network devices, perform necessary inspection and reverse-engineering activities to understand the behavior of the software, the root cause for its presence, and develop recommendations on how to counter the threat.
Responsibilities include, but are not limited to:
Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of static and dynamic malware analysis tools, including disassemblers, debuggers, virtual machines, hex editors, and un-packers.
Perform research in the area of malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive actions.
Conduct reverse-engineering for known and suspected malware files. Investigate instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration.
Produce reports detailing attributes and functionality of malware, and indicators that can be used for malware identification/detection, to include behavior, identified infrastructure used for command and control, and mitigation techniques. Analyze the relationship between a given sample of malware and other known samples/families of malware, and notable features that indicate the origin or sophistication of the malware and its authors.
Develop network and host-based signatures to identify specific malware. Recommend heuristic or anomaly-based detection methods.
Provide subject matter expertise in the detection, analysis and mitigation of malware, trends in malware development and capabilities, and proficiency with malware analysis capabilities.
Support the maintenance of malware analysis platforms and tool sets, identify requirements for new malware analysis capabilities, and contribute to the development of new malware analysis tools and techniques.
Bachelor's degree in computer engineering, computer science, or other closely related IT discipline.
Minimum of 10 years of progressively responsible experience in cyber security, incident response, forensic investigations, with at least a minimum 8 years of experience specifically conducting cyber forensic investigation independently.
Two years of experience leading a team of cyber forensic examiners
Strong analytical and problem-solving skills.
Good interpersonal, organizational, writing, communications, and briefing skills.
Cyber Security Forensic Specialist – IAT Level III or CND-IR certifications
Minimum of four years’ experience in technology/tools specific to the target platforms.
Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and Open Source tools like OllyDbg.
Understanding of behavioral based threat models like Cyber Kill Chain, etc.
Familiarity with Linux OS and mobile iOS/Android forensics.
Capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders.
Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques.
A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats.
Understanding of software engineering methodologies.
Ability to analyze shellcode, and packed and obfuscated code, and their associated algorithms.
Understanding of common attacker methodologies and exploit techniques.
Capable of Python scripting to automate analysis and reverse engineering tasks.
Strong understanding of network protocols and networking concepts.
Strong understanding of Windows Operating System Internals and Windows APIs.
Strong understanding of the PE file format and experience parsing structured or unstructured data.
Good interpersonal, strong initiative, problem solving, organizational, writing, communications, and briefing skills.
IDA Pro, Debbugers, disassemblers, virtual machines, hex editors, and un-packers, X-Ways and Open source methods and tools to perform malware forensic investigations.
Security Clearance Requirements:
TS/SCI /with Polygraph
Equal Opportunity Employment Cornerstone Defense is proud to be an Equal Opportunity Employer. We are committed to creating an inclusive working environment for all employees and to upholding diversity in our recruiting and hiring processes. All qualified applicants will receive equal consideration for employment without regard to sex, gender identity, sexual orientation, race, color, age, religion, national origin, physical or mental disability, protected Veteran status, or any other characteristic protected by law.