BACK

Malware Forensics Analyst – Principal / Senior Principal

Requisition ID: R10035492

  • Category IconCategory: Information Technology
  • Location IconLocation: Fort Gordon, Georgia, United States of America
  • Citizenship IconCitizenship Required: United States Citizenship
  • Clearance IconClearance Type: SCI
  • Telecommute IconTelecommute: No- Teleworking not available for this position
  • Shift IconShift: 1st Shift (United States of America)
  • Travel IconTravel Required: Yes, 10% of the Time
  • Positions IconPositions Available: 1

At Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations to come. Our pioneering and inventive spirit has enabled us to be at the forefront of many technological advancements in our nation's history - from the first flight across the Atlantic Ocean, to stealth bombers, to landing on the moon. We look for people who have bold new ideas, courage and a pioneering spirit to join forces to invent the future, and have fun along the way. Our culture thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work — and we have an insatiable drive to do what others think is impossible. Our employees are not only part of history, they're making history.

Northrop Grumman is actively seeking an experienced Cyber Systems Engineer to fill a Malware Forensic Analyst role that requires a broad array of knowledge and skills working with team members to support a Cyber Security program located at Ft. Gordon.

We're looking for a highly motivated individual with an impeccable work ethic and a strong ability to work in a collaborative fast-moving dynamic team environment working in the area of malware reverse engineering / digital forensics. This position involves engineering solutions to national security threats with analysis that may involve reverse engineering or vulnerability research of network and communication systems. The position requires solid system analysis skills including a strong knowledge of tools and suites used for malware analysis such as debuggers and disassemblers.

Basic Qualifications for Principal Malware Forensic Analyst:

  • 5 Years with Bachelors in Science; 3 Years with Masters; 0 Years with PhD: NOTE: Four (4) years of additional experience can be substituted in lieu of degree

  • US Citizenship is required with an active DoD Top Secret/SCI security clearance which was active in the last 24 months

  • Must possess or be able to obtain DoD 8570 Certification for IAT Level II or higher within two (2) months of starting

Basic Qualifications for Sr. Principal Malware Forensic Analyst:

  • 9 Years with Bachelors in Science; 7 Years with Masters; 4 Years with PhD: NOTE: Four (4) years of additional experience can be substituted in lieu of degree

  • US Citizenship is required with an active DoD Top Secret/SCI security clearance which was active in the last 24 months

  • Must possess or be able to obtain DoD 8570 Certification for IAT Level II or higher within two (2) months of starting

Preferred Qualifications for both Principal and Sr. Principal Levels:

  • Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques.

  • Detailed understanding of computer networking (e.g. TCP/IP, HTTP, SSL) - Strong understanding of Windows internals: XP, Vista, Win 7/8/10 - Python scripting to automate analysis and reverse engineering tasks

  • Strong knowledge of tools used for malware analysis such as debuggers and disassemblers

  • Strong understanding of Microsoft System Internals and Windows APIs 

  • Experience with commercial tools, like EnCase, XWay, or Binary Ninja

  • Experience with Open source tools, such as Radare2, Metasploit, and OWASP Zap

  • Familiarity with Atlassian suite and VMware products - Functional experience working with military / Department of Defense Cyber community

  • Ability, willingness and desire to train junior analysts in malware and vulnerability analysis and tools

  • Experience in IOT debugging - OSCP, GREM, and/or SANS DFIR certifications - iOS/Android experience in vulnerability research

  • Participation and success in previous cyber flag exercises

  • Analyzes and assesses infrastructures for potential vulnerabilities that may result from improper configurations, hardware or software flaws, or operational weaknesses

  • 2+ years IDA Pro (or similar tool)

  • 2+ years in debugging and performance tools (windbg/gdb/hex-rays/valgrind)

  • Experience with virtualized environments and able to navigate and use a      hybrid cloud to enhance workflows and analysis

  • Ability to quickly make prioritizations and determinations that lead to actionable decisions.

  • Skilled teammate to work together with a team to produce results quickly

  • Ability to communicate technically complex problems to various audiences

  • When required, have the ability to work outside of normal working hours and weekends as needed to support the customer’s needs

  • Be able to support infrequent CONUS travel to user locations for assistance - Strong verbal and written communication skills

  • Able to work in a fast-paced environment


Salary Range: $96,400 USD - $144,600 USD
Salary Range 2: $119,400 USD - $179,200 USD

Employees may be eligible for a discretionary bonus in addition to base pay. Annual bonuses are designed to reward individual contributions as well as allow employees to share in company results. Employees in Vice President or Director positions may be eligible for Long Term Incentives. In addition, Northrop Grumman provides a variety of benefits including health insurance coverage, life and disability insurance, savings plan, Company paid holidays and paid time off (PTO) for vacation and/or personal business.

The health and safety of our employees and their families is a top priority. The company encourages employees to remain up-to-date on their COVID-19 vaccinations. U.S. Northrop Grumman employees may be required, in the future, to be vaccinated or have an approved disability/medical or religious accommodation, pursuant to future court decisions and/or government action on the currently stayed federal contractor vaccine mandate under Executive Order 14042 https://www.saferfederalworkforce.gov/contractors/.

Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit http://www.northropgrumman.com/EEO. U.S. Citizenship is required for most positions.



Apply Now

BACK

What's great about
Northrop Grumman

  1. Be part of a culture that thrives on intellectual curiosity, cognitive diversity and bringing your whole self to work.
  2. Use your skills to build and deliver innovative tech solutions that protect the world and shape a better future.
  3. Enjoy benefits like work-life balance, education assistance and paid time off.


Did you know?

Northrop Grumman leads the industry team for NASA’s James Webb Space Telescope, the largest, most complex and powerful space telescope ever built. Launched in December 2021, the telescope incorporates innovative design, advanced technology, and groundbreaking engineering, and will fundamentally alter our understanding of the universe.