Reverse Engineer 3

GormatAnnapolis Junction, MD
2d

About The Position

We are looking for a skilled Reverse Engineer to analyze malicious binaries using various methods and determine functionality and indicators of compromise. You will provide information that assists with malware detection and mitigation. Experience with malware reverse engineering is required and expertise with Ghidra and/or IDA Pro is helpful. The Reverse Engineer Level 3 shall possess the following capabilities: Perform technical analysis of malicious binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis, in order to ascertain functionality, capability, call-backs, assist with attribution to adversary infrastructure, and identification of indicators of compromise. Provide information and documentation that enables malware detection, signature creation, and mitigation. Proficiency working with malicious binaries & analysis of assembly code. IOC/APT familiarity and analysis of, Malware detection, signature creations (YARA/SNORT) and mitigation required. Ability to support identification of areas of risk and provide mitigation strategies. Computer networking and RE TTP experience is required.

Requirements

  • Proficiency working with malicious binaries & analysis of assembly code.
  • IOC/APT familiarity and analysis of, Malware detection, signature creations (YARA/SNORT) and mitigation required.
  • Computer networking and RE TTP experience is required.
  • Doctoral degree plus 4 years of relevant experience.
  • Master's degree with 6 years of relevant experience.
  • Bachelor's Degree with 8 years of relevant experience.
  • Associates degree with 10 years of relevant experience.
  • Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university.
  • Relevant experience must be in malware reverse engineering.
  • CISSP, GIAC GREM or CREA Certification is required
  • TS/SCI with polygraph is required.

Nice To Haves

  • Expertise with Ghidra and/or IDA Pro is helpful.

Responsibilities

  • Perform technical analysis of malicious binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis, in order to ascertain functionality, capability, call-backs, assist with attribution to adversary infrastructure, and identification of indicators of compromise.
  • Provide information and documentation that enables malware detection, signature creation, and mitigation.
  • Support identification of areas of risk and provide mitigation strategies.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service