Senior Malware Reverse Engineer

Employer
Vencore
Location
Herndon, VA
Posted
May 17, 2018
Closes
May 21, 2018
Function
Engineer
Industry
Engineering
Hours
Full Time
Overview Vencore is a proven provider of information solutions, engineering and analytics for the US Government. With more than 40 years of experience working in the defense, civilian and intelligence communities, Vencore designs, develops and delivers high impact, mission-critical services and solutions to overcome its customers most complex problems. Headquartered in Chantilly, Virginia, Vencore employs 3,800 engineers, analysts, IT specialists and other professionals who strive to be the best at everything they do. Vencore is an AA/EEO Employer - Minorities/Women/Veterans/Disabled Responsibilities Join Vencore in support of a future contract to provide network security services for an Intelligence Community customer to protect against outside threats. Work with the incident response and forensics teams to perform malware analysis on digital media. Duties include:Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers.Conduct reverse-engineering for known and suspected malware files. Investigates instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration.Provide detailed reports of any findings. Performs research in the area of malicious software, vulnerabilities, and exploitation tactics. Identify vulnerabilities in binaries, identify and analyze shell-code, and recommend preventative or defensive actions.Reverse-engineer malware and incorporate analysis results into detailed reporting to include behavior, identified infrastructure used for command and control, and mitigation techniques. Develop network and host based signatures to identify specific malware. Recommend heuristic or anomaly based detection methods. Compare malware to existing malware signatures. RequiredBS degree in computer engineering, computer science or equivalent. 8 years of experience may be substituted for a degree on a case-by-case basis.Minimum 5 years of progressively responsible experience performing software and malware reverse engineering (3 years), forensics investigations.Strong analytical and problem solving skills Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and Open Source (OllyDbg, Radare, GDB, etc.) tools and methods to perform software and malware reverse engineering investigations. Demonstrated experience writing code (C, C++, Python, etc.) to perform Demonstrated experience in analyzing disassembled code for x86-64 and ARM (32 and 64 bit).Top Secret/SCI w/PolyDesiredCertifications: Certified Reverse Engineering Analyst (CREA), GIAC Reverse Engineering Malware (GREM), or related certification.Experience in hardware reverse engineeringExperience with data recovery tools (PC-3000) and techniquesExperience performing low-level data extraction (JTAG, chip-off, etc.)

Similar jobs

More searches like this