Identification, evaluation, and documentation of malware targeting critical networks.
Requirements
- Experience with malware reverse engineering using static and dynamic analysis tools, including disassemblers, debuggers, virtual machines, or hex editors
- Experience with the identification and classification of malware families based on standard taxonomy and typical malware attack methodologies
- Knowledge of operating systems, including Windows, Linux, and Mac, application behaviors, and network traffic analysis to identify malware exploits
- Ability to reverse engineer binaries of various types, including x86, x64, C, C++, .NET, and Delphi
- Ability to analyze shellcode, packed and obfuscated code, and the associated algorithms
- GREM Certification
Responsibilities
- identification, evaluation, and documentation of malware
- evaluate and analyze complex malicious code using tools, including disassemblers, debuggers, hex editors, un–packers, virtual machines, and network sniffers
- provide the findings in a technical report with details of the malware, identification parameters, advanced capabilities, and mitigation strategies
- perform research in malicious software, vulnerabilities, and exploitation tactics
- lead the development of prototype application software or systems to demonstrate the capability or exploitation of a vulnerability
- reverse engineer binaries of various types, including x86, x64, C, C++, .NET, and Delphi
- analyze shellcode, packed and obfuscated code, and the associated algorithms
Other
- Ability to write clear and concise malware reports for dissemination
- TS/SCI clearance with a polygraph
- on camera during interviews and assessments
- work with colleagues and clients in person, as needed for the specific role