Building a next generation automated malware analysis system for Booz Allen
Requirements
4+ years of experience with Python, C, or C++ programming languages
Experience with embedded device software development and compilers, linkers, and binary code generation process
Experience with static reverse engineering of software binaries, including Ghidra or IDA Pro
Experience with finding and exploiting vulnerabilities in firmware binaries using static and dynamic reverse engineering techniques
Experience researching and correlating CTI information within the industry, including writing and tailoring Yara rules or Snort rules
Experience with techniques used in kill chain analysis
Experience with modern software exploitation techniques, secure boot process, and bootloader design implementation for iOS or Android platforms
Responsibilities
Analyze forensic, event, and signature data and binary, mobile, and executable code to detect a variety of threat types, including malware and advanced persistent threats
Perform analysis on captured volatile data, log data, and captured network traffic data to identify intrusion related artifacts in order to implement immediate defensive countermeasures
Develop innovative solutions to complex problems
Prototype new ideas and new technologies
Help to create solutions to drive the next wave of innovation
Engage with multiple functional groups to comprehend client challenges
Apply advanced consulting and extensive technical expertise as well as full industry knowledge
Other
TS/SCI clearance with a polygraph
Bachelor's degree in Computer Science, Computer Engineering, or Information Systems and 4+ years of experience in malware analysis or reverse engineering roles, or 8+ years of experience in malware analysis or reverse engineering roles in lieu of a degree
Ability to be on camera during interviews and assessments
Willingness to work from a Booz Allen or client site facility periodically
Adherence to Booz Allen's commitment to non-discrimination