A technology-focused organization specializing in advanced software research, development, and engineering is seeking a highly skilled Forensics Malware Analyst and Reverse Engineering Engineer. This role supports mission-critical efforts to analyze and counter sophisticated malicious software impacting complex and sensitive systems.
The position requires onsite support at customer locations as needed and offers the opportunity to work on challenging, real-world malware threats in an operational environment.
Security Requirements
Must be eligible to obtain and maintain a TS/SCI clearance
Must be willing to work onsite in secure environments as needed
Responsibilities
Perform reverse engineering of known and suspected malware samples
Analyze malicious binaries to determine behavior, functionality, and intent
Identify and recommend mitigation strategies for malware and other malicious code targeting communication systems
Conduct static and dynamic analysis, including unpacking and de-obfuscation of advanced malware
Produce detailed written technical reports describing findings, scope, and impact of analyzed threats
Support active operational efforts involving emerging and advanced malware techniques
Develop and refine policies, procedures, and methodologies for malware investigation across multiple network environments
Examine malicious code across a wide range of platforms and device types
Qualifications
Bachelor’s degree with 12+ years of relevant technical experience, or
Master’s degree with a minimum of 10 years of relevant experience
An additional four (4) years of experience may be substituted in lieu of a degree
Extensive experience analyzing malware across operating systems including Linux, macOS, Windows, iOS, Android, and IoT devices
Hands-on experience with reverse engineering and malware analysis tools such as:
IDA Pro, OllyDbg, x64dbg, ScyllaX64
Objdump, Readelf, Ghidra
Process Explorer, CFF Explorer
Wireshark, Fiddler
Regshot, Process Monitor, Process Hacker
Strong knowledge of reverse engineering techniques, file reconstruction, and binary analysis
Proven experience defeating custom and commercial packers using debuggers
Experience with disassembly and disassembler tools
Ability to obtain and maintain a favorably adjudicated DHS background investigation (EOD)
#LAT