Project Cordinator

Malware Reverse Engineer

Guidehouse Washington, DC

 

Responsibilities

Guidehouse is looking for an experienced malware reverse engineer to support a federal government security operations center (SOC).  This role will assist the client and partner agencies with malware analysis or reverse engineering of diverse malware samples. Conduct static and dynamic analysis of malware implants, including reverse engineering malicious portable executable (PE), Android Package Kit (APK), VBA script, PowerShell script, JavaScript, .NET, Microsoft Word Macros, and PDF files.  Produce technical reporting on analysis findings of embedded infrastructure, indicators of compromise, and advanced implant capabilities.  The ideal candidate shall have working knowledge of digital forensic standards including NIST SP 800-61 Computer Security Incident Handling Guide, SP 800-144 Guidelines on Security and Privacy in Public Cloud Computing, ISO/IEC 27041:2015 Guidance on assuring suitability and adequacy of incident investigative method; experience performing malware reverse engineering in on-premise IT environments, as well as Cloud computing environments; experience working in a collaborative team environment, and possess excellent verbal communication and technical writing skills.    

Required Qualifications

  • 3+ years malware reverse engineering experience
  • Experience with decrypting obfuscated scripts and encrypted data
  • Knowledge of basic Internet protocols, including TCP/IP
  • Ability to read or write in one or more assembly languages, including x86, ARM, MIPS, or PowerPC
  • Ability to identify cyber threat tactics, techniques, and procedures (TTPs), as well as attribution
  • Ability to perform static and dynamic malware analysis
  • Experience performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or equivalent software and performing dynamic analysis of software binaries using OllyDbg, WINDbg, or equivalent software
  • Experience with C, Java, and ARM assembly
  • Experience with writing or developing SNORT signatures
  • Experience with reverse engineering x86 Windows binaries
  • Experience with working in virtualized environments
  • DoD Top Secret/SCI security clearance
  • Bachelor’s Degree in Information Technology, Cybersecurity or related field

Desired Qualifications

  • Technical certifications (MCSE, CCNA, etc.)
  • Cybersecurity certifications (CISSP, CEH, etc.)

Malware Reverse Engineer

Guidehouse Washington, DC

 

Responsibilities

Guidehouse is looking for an experienced malware reverse engineer to support a federal government security operations center (SOC).  This role will assist the client and partner agencies with malware analysis or reverse engineering of diverse malware samples. Conduct static and dynamic analysis of malware implants, including reverse engineering malicious portable executable (PE), Android Package Kit (APK), VBA script, PowerShell script, JavaScript, .NET, Microsoft Word Macros, and PDF files.  Produce technical reporting on analysis findings of embedded infrastructure, indicators of compromise, and advanced implant capabilities.  The ideal candidate shall have working knowledge of digital forensic standards including NIST SP 800-61 Computer Security Incident Handling Guide, SP 800-144 Guidelines on Security and Privacy in Public Cloud Computing, ISO/IEC 27041:2015 Guidance on assuring suitability and adequacy of incident investigative method; experience performing malware reverse engineering in on-premise IT environments, as well as Cloud computing environments; experience working in a collaborative team environment, and possess excellent verbal communication and technical writing skills.    

Required Qualifications

  • 3+ years malware reverse engineering experience
  • Experience with decrypting obfuscated scripts and encrypted data
  • Knowledge of basic Internet protocols, including TCP/IP
  • Ability to read or write in one or more assembly languages, including x86, ARM, MIPS, or PowerPC
  • Ability to identify cyber threat tactics, techniques, and procedures (TTPs), as well as attribution
  • Ability to perform static and dynamic malware analysis
  • Experience performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or equivalent software and performing dynamic analysis of software binaries using OllyDbg, WINDbg, or equivalent software
  • Experience with C, Java, and ARM assembly
  • Experience with writing or developing SNORT signatures
  • Experience with reverse engineering x86 Windows binaries
  • Experience with working in virtualized environments
  • DoD Top Secret/SCI security clearance
  • Bachelor’s Degree in Information Technology, Cybersecurity or related field

Desired Qualifications

  • Technical certifications (MCSE, CCNA, etc.)
  • Cybersecurity certifications (CISSP, CEH, etc.)
Job Details
Location

Washington DC

Job Type

Direct Hire

Date Posted

5 months ago


Not the right fit?

Search more jobs