Idaho National Laboratory is hiring a Cybersecurity Researcher to work in our Cyber Operations & Incident Response. Our team works a 9x80 schedule located out of our REC facility with every other Friday off. You will apply advanced scientific and engineering principles to analyze, design, develop, and assess critical infrastructure systems and networks. Work includes tasks such as implementing security protocols, evaluating firewalls, and creating new methods for countering cyber-attacks. Position involves vulnerability assessment of critical infrastructure environments, contributing to the development of analytical tools for network and host interrogation, and engaging in activities surrounding malware analysis and reverse engineering for critical infrastructure engagements. Proficiency in processors, assembly code, red and blue team strategies, industrial network protocols, big data analysis platforms such as Splunk and Elastic Search, as well as formal logic and algorithmic analysis, is essential for success in this multifaceted role. You will report to the manager for our Cyber Operations & Incident Response department. Responsibilities Include: - Analyze and reverse engineer anomalous/malicious software and binaries. • Research mitigation techniques and latest blue team methods. - Work with others to provide assistance and technical solutions for defensive posturing. - Determine and assist others in developing incident response actions and recommending mitigation strategies. - Organize and participate in the development and maintenance of custom code used to analyze network traffic and proprietary protocols, develop attack and defense methodology and code on high-risk industrial computer networks. - Develop technical solutions for national security topics intrusion analysis, malware, systems and vulnerabilities, network security, advanced analytic tools, and data visualization techniques. - Work with peers, threat analysts and senior engineers to identify security issues of existing control systems, platforms, and applications. - Develop algorithms and methods for detecting and preventing cyber-attacks. - Develop and maintain code used to find weaknesses in systems to verify and validate patch effectiveness. - Conduct penetration testing and vulnerability assessments. - Write scripts and develop software utilities to automate security analysis efforts. - Work with customers to develop requirements, produce and test code, and provide necessary documentation for products and software being developed. - Participate in project teams to produce proposals for new work including joint projects with government, academia, and industry. - Continually build and maintain customer relationships and support customer requests with briefings and papers. - Author technical papers, reports and proposals for internal and external release as well as represent the organization by giving technical presentations in public forums. - Participate in both National and International forums for the development of significant new concepts or novel approaches to Critical Infrastructure hunt and incident response, malware reverse engineering and Cyber Security. -