Join our team dedicated to developing and executing innovative solutions in support of customer mission success.
The Malware Analyst/Reverse Engineer supports a mission-critical federal government cybersecurity program. This specialist supports overall network defense activities, provides in-depth analysis of suspected malicious code and/or infected systems and network devices, performs necessary inspection and reverse-engineering activities to understand the behavior of the software and the root cause for its presence, and develops recommendations on how to counter the threat.
The analyst will perform the following job functions:
- Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of static and dynamic malware analysis tools, including disassemblers, debuggers, virtual machines, hex editors, and un-packers
- Perform research in the area of malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive actions
- Conduct reverse-engineering for known and suspected malware files. Investigate instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration
- Produce reports detailing attributes and functionality of malware, and indicators that can be used for malware identification/detection, to include behavior, identified infrastructure used for command and control, and mitigation techniques.
- Analyze the relationship between a given sample of malware and other known samples/families of malware, and notable features that indicate the origin or sophistication of the malware and its authors
- Develop network and host-based signatures to identify specific malware. Recommend heuristic or anomaly-based detection methods
- Provide subject matter expertise in the detection, analysis and mitigation of malware, trends in malware development and capabilities, and proficiency with malware analysis capabilities
- Support the maintenance of malware analysis platforms and toolsets, identify requirements for new malware analysis capabilities, and contribute to the development of new malware analysis tools and techniques
- Clearance: TS/SCI with polygraph
- Education: Bachelor’s degree in computer engineering, computer science, or other closely related IT discipline
- Work experience: Minimum of 10 years of progressively responsible experience in cyber security, incident response, forensic investigations, with at least a minimum 8 years of experience specifically conducting cyber forensic investigation independently
- Two years of experience leading a team of cyber forensic examiners
- Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and open source tools like OllyDbg
- Understanding of behavioral based threat models like Cyber Kill Chain, etc.
- Familiarity with Linux OS and mobile iOS/Android forensics
- Demonstrated experience writing code (C, C++, Python, Perl, Java, PowerShell, Assembly language, etc.)
- Capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders
- Working knowledge of computer network exploitation (CNE), computer network attack (CNA), and computer network defense (CND) tools and techniques
- A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats
- Understanding of software engineering methodologies
- Ability to analyze shellcode, packed and obfuscated code, and their associated algorithms
- Understanding of common attacker methodologies and exploit techniques
- Capable of python scripting to automate analysis and reverse engineering tasks
- Strong understanding of network protocols and networking concepts
- Strong understanding of Windows Operating System Internals and Windows APIs
- Strong understanding of the PE file format and experience parsing structured or unstructured data
- Good interpersonal, strong initiative, problem solving, organizational, writing, communications, and briefing skills
- Education: Master’s degree in a technical discipline
- Certifications: GREM, GCFE, GCFA, Security+
- Experience using EnCase, X-Ways, FTK, and open source methods and tools to perform malware/forensic investigations
TS/SCI with polygraph required.
Novetta, from complexity to clarity.
Novetta delivers highly scalable advanced analytics and secure technology solutions to address challenges of national and global significance. Focused on mission success, Novetta pioneers disruptive technologies in machine learning, data analytics, full-spectrum cyber, cloud engineering, open source analytics, and multi-INT fusion for Defense, Intelligence Community, and Federal Law Enforcement customers. Novetta is headquartered in McLean, VA with over 1,000 employees across the U.S.
Our culture is shaped by a commitment to our core values:
Integrity • We hold ourselves accountable to the highest standards of integrity and ethics.
Customer Success • We strive daily to exceed expectations and achieve customer mission success.
Employee Focus • We invest in our employees’ professional development and training, respecting individuality, and fostering a culture of diversity and inclusion.
Innovation • We know that discovering new and innovative ways to solve problems is critical to our success and makes us a great company.
Excellence in Execution • We take pride in flawless execution as we build a company that is best in class.
Earn a REFERRAL BONUS for the qualified people you know.
For more details, or to submit a referral: bit.ly/NovettaReferrals
Novetta is an equal opportunity/affirmative action employer.
All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected veteran status, age, or any other characteristic protected by law.