Malware Reverse Engineer

Malware Reverse Engineer
Full Time
$90,000 - $110,000
Work from home not available Travel not required

Job Description

***We are unable to sponsor for this permanent full-time role***

Prestigious Fortune 500 Company is currently seeking a Malware Reverse Engineer. Candidate will perform malware analysis and reverse engineering in support of incident response, investigative analysis, threat hunting, and research on existing and emerging cyber threats. The role will involve in-depth analysis of static and behavioral analysis of complex malicious code utilizing various tools, including disassemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers. The candidate will perform the functions of malware analyst/reverse engineer and serve as a liaison for Threat Services, and mentor and collaborate with the threat hunting, incident handling/response, and forensics teams.

Responsibilities:

Use expertise in malware analysis/reverse engineering to evaluate and analyze complex malicious code.
Perform reverse-engineering for suspected or known malware files, determining the TTPs associated with the code.
Develop custom tools designed to automate analysis.
Perform research around malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive actions.
Produce detailed reports identifying attributes and functionality of malware, and IOCs that can be used for malware identification/detection, to include behavior, identified infrastructure used for command and control, and mitigation techniques.
Assist in identifying (hunting) and profiling threat actors and TTPs.
Develop host and network based signatures to identify specific malware via heuristic and/or anomaly based detection methods.
Participate in formal technical briefing and proposals.
Perform as an Information Security SME in the several of the following areas:
Malicius code behavior
Threat Intelligence
Incident Respnse
Web Applicatin
Lg analysis (statistical modeling, correlation, pattern recognition, etc.Microsoft platform (Server, workstation, applications)
Key Responsibilities (Cont’d)
Open Systems platfrms (Linux, UNIX, VM Ware ESX)
Netwrking (firewalls, IDS/IPS, packet capture)
Databases (Oracle, SQL Server, DB2, IMS)
Qualifications:

Bachelors and/or Masters Degree in Engineering, Computers Science, or related field
5+ years overall technical experience in either reverse engineering/malware analysis, threat intelligence, incident response, security operations, or related information security field.
5+ years experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, RDBMS/NoSQL database administration, etc.
2+ years experience in penetration testing or ethical hacking
2+ years experience with reverse engineering tools like IDA Pro, Ghidra, OllyDbg, Windbg, and Wireshark.
2+ years experience of Python scripting to automate analysis and reverse engineering tasks (and Bash or Powershell or PerlC/C++).
2+ years experience of x86, ARM, and x64 architectures.
Ability to reverse engineer binaries of various types including: x86, x64, C, C++, and .NET.
Strong understanding of Windows Operating System Internals, Windows APIs, and writing and analyzing DLLs.
Recent experience developing custom software and hardware tools to assist in performing reverse engineering and vulnerability analysis.
Strong understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc.
Experience with security operations tools, including but not limited to:
SIEM (e.g. Splunk, ArcSight)
Indicatr management (e.g. ThreatConnect)
Link/relatinship analysis (e.g. Maltego, IBM i2 Analyst Notebook)
Signature develpment/management (e.g. Snort rules, Yara rules)
Broad experience with various common security infrastructure tools (NIDS, HIPS, EDR, etc.)
Excellent analytical and problem solving skills, a passion for research and puzzle-solving.
Expert understanding of large, complex corporate network environments.
Strong communication (oral, written, presentation), interpersonal and consultative skills, especially in regard to white papers, briefs, and presentations.
Good organization and documentation skills.
Leadership and mentorship skills.
Strong experience with programming languages (Python, Bash, PowerShell, Perl, C/C++).
Recent experience developing custom software and hardware tools to assist in performing reverse engineering and vulnerability analysis.
Deep understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc.
Advanced experience with security operations tools, including but not limited to:
SIEM (e.g. Splunk, ArcSight)
Indicatr management (e.g. ThreatConnect)
Link/relatinship analysis (e.g. Maltego, IBM i2 Analyst Notebook)
Signature develpment/management (e.g. Snort rules, Yara rules)
Broad experience with various common security infrastructure tools (NIDS, HIPS, EDR, etc.)

 

Posted By

Craig Johnson

200 East 5th Ave., Suite 116 Naperville, IL, 60563

Contact
Dice Id : napil006
Position Id : CJ-RevEng
Originally Posted : 4 months ago
Have a Job? Post it

Similar Positions

Malware Reverse Engineer
  • Request Technology, LLC
  • Charlotte, NC
Remote Malware Reverse Engineer Lead
  • The Judge Group, Inc.
  • Charlotte, NC
Splunk Engineer
  • Metasys Technologies
  • Charlotte, NC
Security Operations Center Level 3 Analyst
  • Allstate Insurance Company
  • Charlotte, Nc
Security Engineer
  • Avidxchange.com
  • Charlotte, NC
Senior Splunk Content Engineer
  • Sunsoft Solutions
  • Charlotte, NC
Info Security Engineer 5
  • Kforce Technology Staffing
  • Charlotte, NC
Splunk Developer - Detroit, MI/ Charlotte, NC
  • Digital Technology Solutions
  • Charlotte, NC
Trend Micro Engineer
  • Genpact LLC
  • Salisbury, NC
Information Security Engineer (REMOTE)
  • Strategic Staffing Solutions
  • Winston-salem, NC
Security Engineer (Unix)
  • TM Floyd & Company
  • Columbia, SC
Senior Cyber Security Engineer
  • SAIC
  • Shaw Afb, SC
Service Operations Center (SOC) Analyst
  • Duke University
  • Durham, NC
Splunk Service Engineer/Content Developer
  • Booz Allen Hamilton
  • Durham, NC