Malware Reverse Engineer

Procession Systems
Annapolis Junction, MD, US
Full-time

Job Description

OVERVIEW :

We are seeking a talented Malware Reverse Engineer who is passionate about supporting National Security missions. The ideal candidate appreciates partnering with our customer and a group of cybersecurity experts to build environments and analyze the threat actor intent of malware in support of military intelligence missions.

This position is full time on-site in Annapolis Junction, Maryland.

GENERAL DUTIES :

Perform surface, dynamic, static, manual, and automated analysis on malicious software to determine its nature, capabilities, and potential impact.

Analyze and reverse-engineer compiled executable code to understand its interactions with the environment and gain intelligence on its function and behavior.

Evaluate malware attack capabilities, including transmission characteristics, attributes, and the intended purpose of the software, to understand its threat potential.

Work closely with intelligence professionals to interpret the threat's intentions and capabilities and prepare detailed reports and studies on these findings.

Additionally, provide technical expertise on the necessary hardware and software environments for effective malware triage and analysis.

REQUIRED QUALIFICATIONS :

Clearance : SCI within last 2 years.

Four or more years of experience in a Reverse Engineering role

Four years of experience with program languages such as C / C++ and Python.

Four years of experience with machine architecture, operating system internals, file system and memory management, and assembly language (x64, ARM, MIPS).

Proficient with static and dynamic reverse engineering techniques such as disassembly / decompilation, imports, strings, process monitoring, file system monitoring, network traffic capture, debugging, sandboxing, unpacking and deobfuscation.

Skilled at analyzing compiled and interpreted programming languages.

Experience with tools like IDA Pro, Ghidra, Hopper, Binary Ninja, Frida, PE Explorer, objdump, etc.

Familiar with dynamic tools used for monitoring malware behavior. Experience with tools like kernel and process debuggers, process explorer, Wireshark.

Familiarity with automated analysis systems (e.g. Cuckoo Sandbox) and open-source intelligence resources (e.g. VirusTotal) for initial triage and quick identification of well-known malware.

Ability to write detailed technical reports on analysis findings and to present reports to stakeholders.

Familiarity with MITRE ATT&CK framework, TTPs, IOCs, and CVEs to provide standard nomenclature.

Familiarity with threat sharing platforms (MISP) and threat intelligence interchange standards (STIX, TAXII)

DESIRED QUALIFICATIONS :

Clearance : Polygraph within last 5 years

Education : Bachelor's degree or higher in Computer Science, Information Systems, or a related field.

Certification : Certified Ethical Hacker (CEH)

Malware sandbox analysis and forensics.

Ability to construct analysis sandboxes and to simulate necessary infrastructure to enable malware samples to execute (such as simulating Internet connectivity and DNS resolution).

Ability to perform forensic analysis of sandbox environment to detect changes made by the malware sample during dynamic analysis.

This includes detecting new, deleted, or modified files, changes to system settings, configurations, or registry entries, creation of new user accounts, open network ports, etc.

Ability to use hex editors to modify malware samples in order to bypass anti-reversing logic. This includes logic that detects attached debuggers, virtual environments, excessive delays in process execution, etc.

Ability to capture network and signals transmissions and to analyze the content of those transmissions. To include wired and wireless transmissions (Ethernet, Wi-Fi, Bluetooth, NFC, RF, etc.).

Hardware reverse engineering.

Ability to identify components and pathways attached to printed circuit boards (data and power).

Ability to identify and map pin-out configurations of chips.

Ability to connect to and monitor signals in and out of chips and convert those into binary data, ability to dump firmware images from hardware devices.

Ability to identify hardware analysis requirements and tooling needs for hardware reversing.

Ability to identify hardware anti-tamper mechanisms to prevent bricking or destruction of the device.

CLEARANCE : TS / SCI minimum

TS / SCI minimum

About Procession Systems

About us

15 days ago
Related jobs
Promoted
AnaVation, LLC
Baltimore, Maryland

AnaVation is looking for a talented Malware Reverse Engineer who is passionate about supporting National Security missions. Analyze and reverse-engineer compiled executable code to understand its interactions with the environment and gain intelligence on its function and behavior. Four or more years...

Procession Systems
Linthicum Heights, Maryland

This junior position provides reverse engineering support to decompile malicious code, remove obfuscation, decrypt strings, identify command-and-control links, find functions, and determine compiler language used to make the malware. This malware analyst/reverse engineer will be conducting examinati...

Two Six Technologies
Fort Meade, Maryland

Bachelor's degree in Engineering, Mathematics, Computer Science, or a related technical discipline, with a minimum of 5 years of hands-on experience in malware reverse engineering; or Master's degree with 3 years of relevant experience; or Doctoral degree with 2 years of experience; or equivalent pr...

TEKsystems
Linthicum Heights, Maryland

Our client is seeking a TS/SCI cleared Malware Reverse Engineer sitting hybrid onsite in Linthicum Heights, MD. ...

AnaVation
Annapolis Junction, Maryland

AnaVation is looking for a talented Malware Reverse Engineer who is passionate about supporting National Security missions. Analyze and reverse-engineer compiled executable code to understand its interactions with the environment and gain intelligence on its function and behavior. Four or more years...

Two Six Technologies
Fort Meade, Maryland

Bachelor's degree in Engineering, Mathematics, Computer Science, or a related technical discipline, with a minimum of 5 years of hands-on experience in malware reverse engineering; or Master's degree with 3 years of relevant experience; or Doctoral degree with 2 years of experience; or equivalent pr...

Booz Allen Hamilton
Annapolis Junction, Maryland

Ability to use static and dynamic tools and techniques to analyze and reverse-engineer malware. Support day-to-day operations focused on building a next generation automated malware analysis system. Analyze forensic, event, and signature data and binary, mobile, and executable code to detect a varie...

Peraton
Fort Meade, Maryland

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy.As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated ...

Booz Allen Hamilton
Annapolis Junction, Maryland

Malware Reverse Engineer, Senior. As a Malware Engineer, you know that identification, evaluation, and documentation of malware play key roles in the CNO life cycle. Experience with malware reverse engineering using static and dynamic analysis tools, including disassemblers, debuggers, virtual machi...

Peraton
Fort Meade, Maryland

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy.As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated ...