Malware Reverse Engineer
Location: Laurel, MD
TechGuard Security is looking for a Malware Reverse Engineer who will assist DCO/OCO analysts with complex analysis of forensic, event and signature data as well as binary, mobile, executable code leading to the detection of a variety of threat types including malware and potentially advanced persistent threats. This candidate will document the analysis techniques in a triage database to assist others in timely kill chain analysis. They will capture and perform initial analysis on captured volatile data, log data, captured network traffic data, to identify any immediate intrusion related artifacts which in turn will allow immediate defensive countermeasures to be implemented and will develop necessary procedures or scripts to identify such data. They will use both static and dynamic tools/techniques to analyze and reverse-engineer malware.
- Ability to develop code that takes advantage of a weakness in an operating system, application or any other software code, including application plug-ins. Familiar with disassembly tools and able to develop functional exploits; Create custom shellcode; develop code that can bypass typically security measures; experience with ring 0 programming.
- Demonstrated experience and/or training in using both static and dynamic tools/techniques to analyze and reverse-engineer malware, to include: Binary Ninja, Immunity Debugger, Ollydbg, Windbg, Ida Pro, and/or Ghidra.
- A Bachelor’s Degree in computer science, computer engineering, or information systems or related discipline with 4 years of demonstrated experience. In lieu of a degree, 8 years of demonstrated experience is required.
Clearance Requirements: Must possess a TS SCI with Poly Security Clearance.
Email resumes to: [email protected]