Reverse Engineer 2

RealmOneSan Antonio, TX
97d

About The Position

RealmOne was built on the principle that people matter first and foremost. We believe in providing a strong work/life balance by investing in our employees and encouraging professional and personal growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch industry professionals. Join us on this journey as we execute this mission-critical contract providing high-end analytics and data science services within the REALM of cybersecurity. Your effort and expertise are crucial to the success and execution of this impactful mission. This opportunity supports a team of Data Scientists, Cryptologic Computer Scientists, Cryptanalytic Computer Scientists, Cryptologic Cyber Planners, Intrusion Analysts, Protocol Analysts, Signals Analysts and Reverse Engineers, responsible for improving, protecting, and defending our Nation’s Security.

Requirements

  • Bachelor’s degree and 5 years’ relevant experience OR Master’s degree and 3 years of relevant experience OR Doctoral degree and 2 years of relevant experience.
  • An associates degree plus 7 years of relevant experience may be considered for individuals with in-depth experience.
  • Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university.
  • Active Security Clearance with appropriate Polygraph.

Nice To Haves

  • Experience with malware reverse engineering.
  • Certifications: CISSP, GIAC GREM or CREA Certification.

Responsibilities

  • Perform technical analysis of malicious binaries using various methods.
  • Determine functionality and indicators of compromise.
  • Provide information that assists with malware detection and mitigation.
  • Conduct controlled execution and/or static analysis of assembly code.
  • Overcome techniques designed to defeat analysis.
  • Ascertain functionality, capability, call-backs, and assist with attribution to adversary infrastructure.
  • Identify indicators of compromise.
  • Provide information and documentation that enables malware detection, signature creation, and mitigation.

Benefits

  • Exceptional benefits.
  • Flexible schedules.
  • Paid training.
  • Mentoring.
  • Opportunity to work alongside top-notch industry professionals.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service