About us: Mission Driven, Employee Focused At CTI, you'll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry. If you're a technical changemaker with a passion for Cyber Operations, Cloud and Data Analytics, or Engineering, we're looking for you! Love what you do AND where you work - alongside a supportive, innovative team of like-minded individuals. After all, we know that your best work happens when you live your best life, and we do everything we can to make that possible. Are you ready for your best career move? Intel Agency polygraph is strongly preferred. Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance is required for the position. Description:
•Employs engineering techniques and processes to analyze software to identify vulnerabilities
•Re-creates programs to rebuild something similar to it, exploits its weaknesses, or strengthens its defenses
•Develops design specifications by inspection and analysis to offset various malware and to protect and defend USCYBERCOM infrastructure
•Develops, researches, and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption •Conducts vulnerability assessments/penetration tests of information systems
•Ensures software standards are met; designs, develops, documents, tests, and debugs applications software and systems that contain logical and mathematical solutions
•Performs in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM The day-to-day:
•Participates in formal technical briefing and proposals
•Performs system analysis, reverse engineering, and static, dynamic, and best-practice malware analytical methodologies on Windows, Android, or UNIX-based platforms
•Has an in-depth understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.), malware and programming skills to include C/C++ and Assembly language, and detailed understanding of how network-based attacks work at the operating system and/or protocol level The qualifications (required):
•Must be a US Citizen
•Must have TS/SCI clearance w/ active polygraph
•Minimum five (05) years of experience as a Malware Analyst or a related functional area
•A minimum of DOD 8140/DOD 8570 IAM Level II Certification, CSSP Incident Responder, or CSSP Infrastructure Support •Minimum of Bachelor's Degree from an accredited college or university in Computer Engineering, Computer Science, Cybersecurity, Computer Engineering, or related discipline $85,000 - $172,000 a year The pay range for this job, with multi-levels, is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law. The benefits package: • Affordable healthcare options with 80% employer paid premium PLUS a company-funded HSA
• Dental insurance with 100% employer paid premium
• Vision with 80% employer paid premium
• Employer paid Life insurance 100%
• Employer paid Short-term and Long-term disability 100% • Annual training, continued education, and professional memberships reimbursement
• Unlimited access to Red Hat Enterprise Linux and AWS training and accreditation
• Annual reimbursement for technology i.e. phones, computers, printers, etc.
• 401(k) with company match up to 5% with 100% immediate vesting (after 90 days of employment) The environment and perks: • Professional development investment and paid time off for training
• Contract and work locations in Maryland, Virginia, Colorado, Texas, Utah, California, Florida and Hawaii.
• Team building events throughout the year such as Destination Family Events, Holiday Party, Monthly Get-Togethers
• Leadership Team engagement and mentorship
• Performance Recognition Program
• Complimentary branded apparel Don't see a job opening that's the perfect fit? Apply to our General Position to join our talent pool for consideration for future opportunities. Know someone else who may be a good fit? Refer them through the CTI External Referral Program and you could receive a one-time referral bonus of up to $10,000 ! Email for more information. Constellation Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, religion, creed, color, national origin, ancestry, sex (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, medical condition, marital or domestic partner status, sexual orientation, gender, gender identity, gender expression and transgender status, mental disability or physical disability, genetic information, military or veteran status, citizenship, low-income status or any other status or characteristic protected by applicable law. Job applicants can submit questions about CTI's equal employment opportunity policy to .
•Employs engineering techniques and processes to analyze software to identify vulnerabilities
•Re-creates programs to rebuild something similar to it, exploits its weaknesses, or strengthens its defenses
•Develops design specifications by inspection and analysis to offset various malware and to protect and defend USCYBERCOM infrastructure
•Develops, researches, and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption •Conducts vulnerability assessments/penetration tests of information systems
•Ensures software standards are met; designs, develops, documents, tests, and debugs applications software and systems that contain logical and mathematical solutions
•Performs in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM The day-to-day:
•Participates in formal technical briefing and proposals
•Performs system analysis, reverse engineering, and static, dynamic, and best-practice malware analytical methodologies on Windows, Android, or UNIX-based platforms
•Has an in-depth understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.), malware and programming skills to include C/C++ and Assembly language, and detailed understanding of how network-based attacks work at the operating system and/or protocol level The qualifications (required):
•Must be a US Citizen
•Must have TS/SCI clearance w/ active polygraph
•Minimum five (05) years of experience as a Malware Analyst or a related functional area
•A minimum of DOD 8140/DOD 8570 IAM Level II Certification, CSSP Incident Responder, or CSSP Infrastructure Support •Minimum of Bachelor's Degree from an accredited college or university in Computer Engineering, Computer Science, Cybersecurity, Computer Engineering, or related discipline $85,000 - $172,000 a year The pay range for this job, with multi-levels, is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law. The benefits package: • Affordable healthcare options with 80% employer paid premium PLUS a company-funded HSA
• Dental insurance with 100% employer paid premium
• Vision with 80% employer paid premium
• Employer paid Life insurance 100%
• Employer paid Short-term and Long-term disability 100% • Annual training, continued education, and professional memberships reimbursement
• Unlimited access to Red Hat Enterprise Linux and AWS training and accreditation
• Annual reimbursement for technology i.e. phones, computers, printers, etc.
• 401(k) with company match up to 5% with 100% immediate vesting (after 90 days of employment) The environment and perks: • Professional development investment and paid time off for training
• Contract and work locations in Maryland, Virginia, Colorado, Texas, Utah, California, Florida and Hawaii.
• Team building events throughout the year such as Destination Family Events, Holiday Party, Monthly Get-Togethers
• Leadership Team engagement and mentorship
• Performance Recognition Program
• Complimentary branded apparel Don't see a job opening that's the perfect fit? Apply to our General Position to join our talent pool for consideration for future opportunities. Know someone else who may be a good fit? Refer them through the CTI External Referral Program and you could receive a one-time referral bonus of up to $10,000 ! Email for more information. Constellation Technologies is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, religion, creed, color, national origin, ancestry, sex (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, medical condition, marital or domestic partner status, sexual orientation, gender, gender identity, gender expression and transgender status, mental disability or physical disability, genetic information, military or veteran status, citizenship, low-income status or any other status or characteristic protected by applicable law. Job applicants can submit questions about CTI's equal employment opportunity policy to .