Vacancy expired!
Job ID: 2214486
Location: BETHESDA , MD , US Date Posted: 2022-09-26Category: SoftwareSubcategory: SW EngineerSchedule: Full-timeShift: Day JobTravel: NoMinimum Clearance Required: TS/SCIClearance Level Must Be Able to Obtain: TS/SCI with PolyPotential for Remote Work: NoDescription SAIC has several immediate Senior Malware Engineer / Reverse Engineer openings on a newly awarded contract located in Bethesda! You would work in the Technical Exploitation Intelligence Support team which is critical in supporting DoD, Federal, and IC partners' Global War on Terrorism efforts. SAIC is building a team of malware engineers that have experience with threat actor tracking, malware analysis, and reverse engineering of malware. The primary responsibilities will focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability. This position will include the following duities:- Isolates, reviews, analyzes, and reverse-engineers malicious binaries and/or code to determine functionality and capability
- Conducts dynamic and static analysis of samples with emphasis on disassemblers
- Perform static code analysis on malware samples to extract indicators
- Analyzes multiple assembly and scripting languages, other operating system binaries (ex. ELF), web shells, and other file-specific malware such as Office or PDF malware
- Analyze malware obtained from internal and external sources
- Analyze endpoint telemetry for anomalous and malicious behavior
- Applies expertise in discovering, analyzing, diagnosing, and reporting on malware events, files and network intrusion and vulnerability issues
- Reverse engineers code from mobile devices
- Creation of tools and scripts to assist in the analysis of malware analysis
- Research malware families and threat groups to find new technical indicators and tactics, techniques, and procedures (TTPs) to be used for threat hunting efforts
- Tracking malware campaigns, malicious actors, and related infrastructure
- Recommends sound counter measures to malware and other malicious type code and applications which exploit customer communication systems
- In-depth analysis of malware, including authoring analysis reports
- As needed, research new trends, techniques, and packaging of malicious binaries and be able to identify zero-day exploits.
- TS/SCI is required. A CI Poly is preferred or be willing and able to obtain a CI Poly.
- Education: BS degree in Computer Science or Engineering (Software, Computer) or an additional 4 years of related expeirence
- Advanced or Expert level experience in Malware Analysis/Reverse Engineering or Exploit Development
- Advanced or Expert level experience analyzing mobile malware from devices running iOS or Android
- Advanced or Expert level experience reverse engineering tools such as IDA Pro, x64dgb, OllyDbg, Immunity Debugger and/or Ghidra
- Advanced or Expert level experience reverse engineering malware code written in C, C, VisualBasic, Java, .NET, Delphi, JavaScript, and VBScript
- Advanced or Expert level experience scripting languages, such as Python or Perl, assembly language experience, and experience with other operating system file formats, such as ELF binaries
- Advanced or Expert level experience with computer forensic software tools such as EnCase, X-Ways, FTK, or Sleuth Kit/Autopsy.
- OSCP or SANS certifications; Project Experience with a focus on malware analysis, software analysis, and low-level programming
Vacancy expired!