Malware Analyst
Peraton
Job Description
Overview We are seeking a highly skilled and innovative Malware Analyst to join our team in the greater DMV area, supporting the Army National Guard. Responsibilities Perform static and dynamic malware analysis to identify functionality, persistence mechanisms, indicators of compromise, and adversary techniques. De-obfuscate code, inspect binaries, and execute controlled sandbox detonations to observe malware behavior and system/network interactions.
Extract, validate, and format IOCs and behavioral signatures for ingestion by detection engineering, SOAR playbooks, and threat-intelligence platforms. Document analysis workflows, results, and mitigation recommendations in technical reports to support incident response and remediation. Collaborate with senior analysts to refine reverse-engineering methods, tooling, and repeatable analysis pipelines.
Support SOC/CIRT investigations by providing timely technical context, evidence artifacts, and analytic inputs for containment and eradication. Contribute to knowledge sharing, playbook updates, and training resources to improve team analytic capability and consistency. Qualifications 2 years with BS/BA; 0 years with MS/MA; 6 years with no degree Clearance: Active TS/SCI clearance.
Candidate must meet ONE of the following: Bachelor's degree in Computer Science, Cybersecurity, Data Science, Information Systems, Information Technology, or Software Engineering; OR Relevant DoD/military training (documented reverse engineering or malware analysis coursework); OR Relevant professional certification or equivalent experience (examples: RCCE Level 1; CHFI). Required experience and skills: Malware analysis, reverse engineering, or incident response experience in enterprise or DoD contexts. Hands-on proficiency with static analysis tools (IDA Pro, Ghidra), dynamic analysis/sandboxing (Cuckoo, REMnux), and binary/PE/ELF analysis techniques.
Familiarity with malware unpacking, decryption, API/IOC extraction, memory forensics, and common obfuscation/packing methods. Ability to produce clear, reproducible analysis artifacts (YARA rules, IOCs, behavior profiles) and communicate findings to technical teams. Basic scripting/programming skills (Python, C/C++, or assembler) for tooling, automation, and analysis tasks.
Desired: Prior DoD/ARNG or classified-environment malware analysis experience. Experience integrating analysis outputs into detection engineering, threat intel platforms, and SOAR playbooks. Advanced certifications or coursework in reverse engineering, malware forensics, or related GIAC/ICS credentials.
Details Target Salary Range: $80,000 - $128,000. This represents the typical salary range for this position. Salary is determined by various factors, including experience, education, knowledge, skills, and competencies, as well as geographic location and business considerations.
Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay. Benefits: Peraton offers eligible employees a variety of benefits including medical, dental, vision, life, health savings account, short/long term disability, EAP, parental leave, 401(k), PTO, and company paid holidays. A full listing of benefits is available at https://www.careers.peraton.com/benefits.
Application Duration: The application period for the job is estimated to be 30 days from the posting date. This timeline may be shortened or extended depending on business needs. EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law. #J-18808-Ljbffr