Description:
The National Security Sector (NSS) seeks a highly qualified and trained Senior-level Media Malware Analysts to support United States Cyber Command (USCYBERCOM) operations by identifying and analyzing sophisticated malware threats targeting USCYBERCOM the Department of Defense Information Network (DODIN), and associated networks and organizations. This vital on-site support to USCYBERCOM J3 (Operations), Cyber National Mission Force (CNMF), and Joint Task Force-Ares (JTF-ARES) underpins USCYBERCOM support to United States National Security objectives.
This opportunity is in anticipation of a potential future contract award.
What You’ll Be Doing
Provide timely, accurate, relevant support in manner that best supports USCYBERCOM in identifying and assessing emerging threats and vulnerabilities in the Cyberspace domain.
Lead forensic analysis of vulnerable or compromised systems and media and identify and analyze adversary TTPs and intrusion artifacts, and lead static and dynamic malware analysis, including reverse engineering and extracting malicious files from digital media and conduct detailed file analysis, as appropriate.
Create technical analysis reports with actionable intelligence findings, delivering timely, accurate, relevant threat briefs and analysis updates that meet explicit and implied requirements, and deliver presentations to leadership in appropriate formats.
Identify unique indicators for signature and heuristic development.
Oversee drafting, release, and implementation of security incident response policies.
Analyze operational reporting to correlate attack trends and shared tradecraft and support development and improvement of enterprise malware analysis tools.
Conduct log/system analysis (routers, Windows, UNIX) for threat detection and update DoD situational awareness mechanisms (e.g., USCYBERCOM portals).
Research open-source intel to inform threat assessments and signature creation.
Develop and maintain validated MD5 hash lists for signature repositories
Analyze and evaluate All-Source finished intelligence, single-source intelligence, and technical data from various sources to identify Cyber threat patterns and anomalies.
Conduct and publish in-depth risk assessments to evaluate and categorize the risk posture of detected cyber threats while supporting development and refinement of risk assessment methodologies and tools used for threat categorization.
Collaborate with operational, technical, and intelligence elements across USCYBERCOM to enhance situational awareness and threat response capabilities.
Maintain a current understanding of advanced persistent threats (APTs), threat actor tactics, techniques, and procedures (TTPs), and cyber threat trends affecting national security.
Maintain situational awareness of, and execute on demand, CO crisis plans.
Provide situational awareness to range of projects, Crisis Action Teams, and current operations activities supporting Operational Planning Teams (OPTs)
Execute resource allocation decisions aligned with organization objectives.
Apply knowledge of cyber threats and attack methods and techniques emanating from state and non-state adversaries and tiered vulnerabilities within Blue Space as focus of threats.
Review, approve, prioritize, and submit operational requirements for research, development, and/or acquisition of Cyber capabilities
Interpret and apply laws, regulations, policies, and guidance relevant to daily activities
Communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
What does Leidos need from me?
Active Top Secret clearance with SCI eligibility and Polygraph required.
BA/BS degree or higher within Computer Science, Cybersecurity, Software Engineering, Digital Forensics, or related field, or ability to complete degree within one year of hire. Can substitute formal education with extended experience and technical certifications.
Eight plus years’ demonstrated proficiency in malware analysis (static/dynamic), incident handling, and reverse engineering.
Working experience with tools such as IDA Pro, Ghidra, Wireshark, Volatility, and sandbox environments.
Strong familiarity with network protocols, OS internals (Windows/Linux/UNIX), and cyber threat analysis
Broad knowledge of Blue-space Cyber capabilities and demonstrate understanding of available Cyber infrastructure or platforms to conduct Defensive (DCO) and Offensive Cyberspace Operations (OCO)
Knowledge of computer networking fundamentals as well as concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
Ability to support timely, accurate, relevant analytical production, to include documents, summaries, issue papers, talking points, and briefings.
Demonstrated proficiency working in a fast-paced collaborative environment, ability to proactively multi-task and meet short deadlines.
Strong interpersonal, critical thinking, and communication skills, including the ability to clearly convey complex and technical data to nontechnical consumers.
| Organization | Leidos |
| Industry | Management Jobs |
| Occupational Category | Senior Media Malware Analyst |
| Job Location | Maryland,USA |
| Shift Type | Morning |
| Job Type | Full Time |
| Gender | No Preference |
| Career Level | Intermediate |
| Experience | 2 Years |
| Posted at | 2026-03-26 9:28 pm |
| Expires on | 2026-05-10 |