Malware Analyst - Reverse Engineer
Description:
• Use expertise in malware analysis/reverse engineering to evaluate and analyze complex malicious code
• Perform reverse engineering for suspected or known malware files, determining the TTPs associated with the code
• Develop custom tools designed to automate analysis
• Perform research around malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive action
• Produce detailed reports identifying attributes and functionality of malware, and IOCs that can be used for malware identification/detection, to include behavior, identified infrastructure used for command and control, and mitigation techniques
• Assist in identifying (hunting) and profiling threat actors and TTPs
• Develop host and network-based signatures to identify specific malware via heuristic and/or anomaly-based detection methods
• Participate in formal technical briefing and proposals
• Perform as an Information Security SME in the some of the following areas: Malicious code behavior; Threat Intelligence; Incident Response; Web Application; Program Languages; Operating System platforms (Windows, Linux, OSX, UNIX, VM Ware ESX); Networking (firewalls, IDS/IPS, packet capture)
• Providing mentorship and support to teammates regarding malicious file analysis/behavior, communication/rapport with other divisions and various levels of leadership, technical expertise, and career development
• Capable of identifying need & driving solutions, and providing guidance, in an autonomous manner
Requirements:
• 5+ years overall technical experience in either reverse engineering/malware analysis, threat intelligence, incident response, security operations, or related information security field
• 2+ years experience performing direct reverse engineering/malware analysis
• 2+ years experience in penetration testing, ethical hacking, exploit writing, and vulnerability management
• Advanced experience with reverse engineering tools like IDA Pro, Ghidra, OllyDbg, WinDbg, and BinaryNinja
• Ability to reverse engineer binaries of various types including: x86, x64, C, C++, and .NET
• Deep understanding of x86, ARM, and x64 architectures
• Strong understanding of Windows Operating System Internals, Windows APIs, and writing and analyzing DLLs
• Strong experience with programming languages (Python, Bash, PowerShell, Perl, C/C++, Go)
• Recent experience developing custom software and hardware tools to assist in performing reverse engineering and vulnerability analysis
• Excellent analytical and problem-solving skills, a passion for research and puzzle-solving
• Expert understanding of large, complex corporate network environments
• Strong communication (oral, written, presentation), interpersonal and consultative skills, especially in regard to white papers, briefs, and presentations
• Good organization and documentation skills
• Leadership and mentorship skills
• 4 year Bachelors degree preferred
• Obtained certifications in several of the following: SANS GIAC courses, GREM, CISSP, OSCE, OSCP, CREST CRT, CEH or tool-specific certifications
Benefits:
Apply Job!
Apply to this Job