Updated 6 days ago

Malware Analyst/Reverse Engineer with Security Clearance

Herndon, VA 20170
Full-time, Part-time
Malware Analyst/Reverse Engineer
at Novetta
McLean, Virginia; Herndon, VA Join our team dedicated to developing and executing innovative solutions in support of customer mission success. Job Description: The Malware Analyst/Reverse Engineer supports a mission-critical federal government cybersecurity program. This specialist supports overall network defense activities, provides in-depth analysis of suspected malicious code and/or infected systems and network devices, performs necessary inspection and reverse-engineering activities to understand the behavior of the software and the root cause for its presence, and develops recommendations on how to counter the threat. The analyst will perform the following job functions: Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of static and dynamic malware analysis tools, including disassemblers, debuggers, virtual machines, hex editors, and un-packers
Perform research in the area of malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive actions
Conduct reverse-engineering for known and suspected malware files. Investigate instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration
Produce reports detailing attributes and functionality of malware, and indicators that can be used for malware identification/detection, to include behavior, identified infrastructure used for command and control, and mitigation techniques.
Analyze the relationship between a given sample of malware and other known samples/families of malware, and notable features that indicate the origin or sophistication of the malware and its authors
Develop network and host-based signatures to identify specific malware. Recommend heuristic or anomaly-based detection methods
Provide subject matter expertise in the detection, analysis and mitigation of malware, trends in malware development and capabilities, and proficiency with malware analysis capabilities
Support the maintenance of malware analysis platforms and toolsets, identify requirements for new malware analysis capabilities, and contribute to the development of new malware analysis tools and techniques Basic Qualifications: Clearance: TS/SCI with polygraph
Education: Bachelor’s degree in computer engineering, computer science, or other closely related IT discipline
Work experience: Minimum of 10 years of progressively responsible experience in cyber security, incident response, forensic investigations, with at least a minimum 8 years of experience specifically conducting cyber forensic investigation independently
Two years of experience leading a team of cyber forensic examiners
Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and open source tools like OllyDbg
Understanding of behavioral based threat models like Cyber Kill Chain, etc.
Familiarity with Linux OS and mobile iOS/Android forensics
Demonstrated experience writing code (C, C++, Python, Perl, Java, PowerShell, Assembly language, etc.)
Capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders
Working knowledge of computer network exploitation (CNE), computer network attack (CNA), and computer network defense (CND) tools and techniques
A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats
Understanding of software engineering methodologies
Ability to analyze shellcode, packed and obfuscated code, and their associated algorithms
Understanding of common attacker methodologies and exploit techniques
Capable of python scripting to automate analysis and reverse engineering tasks
Strong understanding of network protocols and networking concepts
Strong understanding of Windows Operating System Internals and Windows APIs
Strong understanding of the PE file format and experience parsing structured or unstructured data
Good interpersonal, strong initiative, problem solving, organizational, writing, communications, and briefing skills Desired Skills: Education: Master’s degree in a technical discipline
Certifications: GREM, GCFE, GCFA, Security+
Experience using EnCase, X-Ways, FTK, and open source methods and tools to perform malware/forensic investigations
Security Clearance: TS/SCI with polygraph required.
Posting ID: 602943318Posted: 2021-06-15Job Title: Malware Analyst Reverse