Malware Reverse Engineering Manager

PeratonLinthicum, MD
Onsite

About The Position

The Malware Forensics Manager will be responsible for the management of 8-13 malware who are responsible for conducting malware analysis, reverse engineering software development, and other forensic activities spanning the cyber-attack lifecycle, from the initial exploit and malware execution path to callback destinations and follow-on binary download attempts. This individual will be responsible for leading intrusion investigations, managing incident responders, briefing technical findings to leadership, and ensuring all tasks are accomplished. As the manager, responsibilities include interviewing, selection and hiring; training new and existing employees; planning, assigning and directing work; addressing employee performance and corrective action plans; employee motivation and rewards. This person will serve as a key member of the forensics management team, who will work with other team leaders and task areas to: Clarify/resolve process-related activities for technical team. Monitor and report progress against plans through final acceptance and signoff. Manage, coordinate, and resolve project issues, decisions, and risks. If the candidate is already on the program, the candidate will maintain Individual Contributor (IC) role. If the candidate is not, then the individual would also need to be selected for an open IC role. This position requires full-time, onsite attendance Monday through Friday in the Baltimore metropolitan area.

Requirements

  • Requires BA/BS in Computer Science, Cybersecurity, Data Science, Information System, Information Technology or Software Engineering with 12 years of experience (may have supervisory or lead experience)
  • Requires an active Top Secret clearance with SCI eligibility
  • Possession of at least one of the following active certifications: GIAC Certified Forensic Analyst (GCFA), GIAC Certified Incident Handler (GCIH), CyberSec First Responder (CFR), Cybersecurity Analyst+ (CySA+), or an equivalent certification
  • A minimum of seven (7) years of hands-on experience in Digital Forensics and Incident Response (DFIR), with at least five (5) years of that experience focused on network intrusion analysis, malware forensics, and memory analysis.
  • A minimum of three (3) years of experience within the last five years in a leadership or supervisory role, responsible for leading intrusion investigations, managing incident responders, and briefing technical findings to leadership.
  • Demonstrated experience within the last three years analyzing advanced persistent threat (APT) activity and correlating findings from multiple data sources (e.g., host forensics, network logs, and threat intelligence)
  • Demonstrated strong written and verbal communication skills
  • Demonstrated strong customer and partner relationship building skills

Nice To Haves

  • Experience performing digital and multimedia forensics examinations, analysis, and techniques.
  • Experience working with MS Windows, Apple/UNIX, and Linux operating systems related to forensics examinations.
  • Experience with forensic network analysis in support of the investigative process.
  • Experience within the last seven years analyzing endpoint, Packet Capture (PCAP) data, and other relevant data sources.

Responsibilities

  • Management of 8-13 malware analysts
  • Conducting malware analysis
  • Reverse engineering software development
  • Conducting forensic activities spanning the cyber-attack lifecycle
  • Leading intrusion investigations
  • Managing incident responders
  • Briefing technical findings to leadership
  • Interviewing, selection and hiring
  • Training new and existing employees
  • Planning, assigning and directing work
  • Addressing employee performance and corrective action plans
  • Employee motivation and rewards
  • Clarify/resolve process-related activities for technical team
  • Monitor and report progress against plans through final acceptance and signoff
  • Manage, coordinate, and resolve project issues, decisions, and risks
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service