SOSi

Malware Engineer

Job Locations US-MD-Fort Meade
Job Post Information* : Posted Date 4 months ago(5/28/2020 11:00 AM)
ID
2020-3829
Category
Information Technology
Location : Location
US-MD-Fort Meade
Clearance Requirement
Top Secret/SCI
Job Requires Relocation
Yes

Overview

SOSi is seeking an experienced Malware Engineer to support its work on Ft. Meade, Maryland. The Malware Engineer will analyze, reverse, and repurpose software designed to cause damage to computer equipment and network devices. They will assist analysts with the dissection and understanding of malware samples collected and stored within a malware repository. Leveraging industry leading software, hardware, and frameworks, the Engineer will learn to understand the effects caused by a given sample, it’s tactics, techniques, and procedures (TTPs), and associated threat actor(s).

Responsibilities

  • Analyze executables and malicious files.
  • Collaborate with a team of experienced malware analysts and researchers.
  • Develop novel solutions to challenges facing incident responders and malware analysts.
  • Support the company’s research and development efforts.
  • Strong programming skills.
  • Ability to analyze disassembly of x86 and x64 binaries.
  • Knowledgeable in the use of:
    • IDA Pro disassembler
    • User- and kernel-mode debuggers
    • Common binary file formats
    • Dynamic analysis tools
    • Network analysis tools
  • Ability to reverse engineer binaries of various types including:
    • C/C++
    • Delphi
    • NET
    • Flash
    • Compiled VBScript
  • Understanding of software exploits.
  • Experience developing scripts to decode obfuscated data and network communications.
  • Experience developing applications in C, C++, and .NET.
  • Thorough understanding of network protocols.
  • Experience mitigating anti-reverse engineering techniques.
  • Ability to develop code that takes advantages of a weakness in an operating system, application or any other software code, including application plug-ins. Familiar with disassembly tools and able to develop functional exploits; Create custom shellcode; develop code that can bypass typically security measures; experience with ring 0 programming.
  • The ability to understand and create code in C, and Python or JavaScript.
  • Demonstrated experience and/or training in using both static and dynamic tools/techniques to analyze and reverse-engineer malware, to include: Binary Ninja, Immunity Debugger, Ollydbg, Windbg, Ida Pro, and/or Ghidra.

Qualifications

  • Minimum Bachelor’s of Science Degree and 8 years related professional experience.
  • In Scope DoD Secret clearance.
  • Must meet IAT Level II certification such as Security+ or equivalent.
  • SME in Malware technologies will be required to have at minimum six (6) years of relevant experience in malware analytics and ZND technologies including FireEye products NX, VX, and CMS and McAfee products ATD and NSP. 

Preferred Qualifications

  • 8+ years of related professional experience. 
  • In scope TS/SCI Clearance.
  • IAT Level III certification. IAT certification Level III certifications can include Certified Information Systems Security Professional or CompTIA Advanced Security Practitioner CE. 
  • Knowledge of and experience with FireEye's NX, VX, and/or CMS is a huge plus.

Working Conditions

  • Work environment is typical for an office setting.

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed