Jr. Malware Reverse Engineer

PeratonArlington, VA
12d$86,000 - $138,000Hybrid

About The Position

Peraton is currently seeking a Jr. Malware Reverse Engineer to support a long-term government customer with its Federal Strategic Cyber group located in Arlington, VA. Location: Arlington, VA. Hybrid (50/50); must be local and able to come on-site as needed. In this role, you will: Focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability. Analyze samples and provide a written technical report related to the scope, nature, and characteristics of the malicious code. Support active operations and present you with cutting edge challenges in the malware arena. Recommend counter measures to malware and other malicious type code and applications that exploit customer communication systems. Conduct reverse engineering for known and suspected malware files. Develop policies and procedures to investigate malware incidents for various computer networks.

Requirements

  • Bachelor’s degree and a minimum of 5 years related technical experience; or a Master’s and minimum of 3 years’ experience. An additional 4 years of experience may be substituted in lieu of degree.
  • Experience with and the ability to examine malicious applications from a variety of operating systems such as Linux, Mac, Windows, IOS, Android operating systems, and IOT network devices.
  • Knowledge of several of the following tools: Process Explorer, CFF Explorer, Wireshark, Fiddler, Regshot, Process Monitor, and Process Hacker
  • Knowledge of reverse engineering and file reconstruction practices.
  • Ability to perform static and dynamic analysis of applications and scripts.
  • Ability to unpack and de-obfuscate highly complex malicious applications.
  • Debugging and Debugger experience (Experience identifying and defeating known or custom packers).
  • Disassembling/disassemblers experience.
  • U.S. citizenship required.
  • An Active Secret Security Clearance with the ability to obtain a TS/SCI is required.
  • In addition, the selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment.

Nice To Haves

  • Knowledge of Java, C, C++, .NET, PowerShell, Golang, C#
  • Knowledge of ICS/SCADA systems

Responsibilities

  • Focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability.
  • Analyze samples and provide a written technical report related to the scope, nature, and characteristics of the malicious code.
  • Support active operations and present you with cutting edge challenges in the malware arena.
  • Recommend counter measures to malware and other malicious type code and applications that exploit customer communication systems.
  • Conduct reverse engineering for known and suspected malware files.
  • Develop policies and procedures to investigate malware incidents for various computer networks.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Entry Level

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service