Malware Reverse Engineer

Employer
Perspecta
Location
Laurel, MD
Posted
Nov 09, 2018
Closes
Nov 12, 2018
Function
Engineer
Industry
Engineering
Hours
Full Time
Overview Every day at Perspecta, we enable hundreds of thousands of people to take on our nation's most important work. We're a company founded on a diverse set of capabilities and skills, bound together by a single promise: we never stop solving our nation's most complex challenges. Our team of engineers, analysts, developers, investigators, integrators and architects work tirelessly to create innovative solutions. We continually push ourselves-to respond, to adapt, to go further. To look ahead to the changing landscape and develop new and innovative ways to serve our customers. Perspecta works with US government customers in defense, intelligence, civilian, health care, and state and local markets. Our high-caliber employees are rewarded in many ways-not only through competitive salaries and benefits packages, but the opportunity to create a meaningful impact in jobs and on projects that matter. Perspecta's talented and robust workforce-14,000 strong-stands ready to welcome you to the team. Let's make an impact together. Perspecta is an AA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories Responsibilities Employ engineering techniques and processes to analyze software to identify vulnerabilities. Re-create programs to rebuild something similar to it, exploits its weaknesses, or strengthens its defenses. Develop design specifications by inspection and analysis to offset various malware and to protect and defend USCYBERCOM infrastructure. Develop, research, and maintain proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption. Conduct vulnerability assessments/penetration tests of information systems. Ensure software standards are met; designs, develops, documents, tests, and debugs applications software and systems that contain logical and mathematical solutions. Perform in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM. Participate in formal technical briefing and proposals. Perform system analysis, reverse engineering, and static, dynamic, and best-practice malware analytical methodologies on Windows, Android, or UNIX-based platforms. Provide in-depth understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.), malware and programming skills to include C/C++ and Assembly language, and detailed understanding of how network-based attacks work at the operating system and/or protocol level. Qualifications Minimum five years of experience as a Malware Analyst. Minimum of Bachelor's Degree from an accredited college or university in Computer Engineering, Computer Science, Cybersecurity, Computer Engineering, or related discipline. A minimum of DOD 8140/DOD 8570 IAM Level I Certification. Strong attention to detail and organizational skills. Excellent communications skills. - **Must have active TS/SCI with Poly** The most qualified candidates will have experience with the following: - IDA Pro (tool for reverse engineering malware) - OllyDdg (tool for debugging malware) - REMnux (software for reverse engineering malware) - EnCase (forensic analysis tool) - Malware Analysis - 80386 Assembly Language Programming - Linux Assembly Language Programming - C/C++ Programming - Reverse Engineering/Disassembly - Intrusion analysis - Incident response - Forensic analysis - Behavioral, dynamic, and static analysis of malware - Building and configuring malware analysis labs - Network incident response - Forensics analysis of hard drives, systems, and networks - Threat intelligence analysis Options

Similar jobs

More searches like this