Peraton
Minimum requirements:
Bachelor’s degree and 8 years of related technical experience, or a Master’s and minimum of 6 years’ experience. An additional 4 years of experience may be substituted in lieu of degree.
Experience with and the ability to examine malicious applications from a variety of operating systems such as Linux, Mac, Windows, IOS and Android operating systems, and IOT network devices.
Knowledge of several of the following tools:
Ida-Pro, Ollydbg, X64dbg, Scyllax64, Objdump, Readelf, Ghidra, Process Explorer, CFF Explorer, Wireshark, Fiddler, Regshot, Process Monitor, and Process Hacker.
Knowledge of reverse engineering and file reconstruction practices.
Ability to perform static and dynamic analysis of applications and scripts.
Ability to unpack and de-obfuscate highly complex malicious applications.
Debugging and Debugger experience (Experience identifying and defeating known or custom packers).
Disassembling/disassemblers experience.
U.S. citizenship required.
An Active Top Secret security clearance with the ability to obtain SCI.
In addition, the selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment.
Preferred Skills:
Experience with Python.
Knowledge of Java, C, C++, .NET, PowerShell, Golang, C#.
Knowledge of ICS/SCADA systems.
Peraton is currently seeking an experiencedMid-level Malware Reverse Engineerto support a long-term government customer with the Federal Strategic Cyber group.
Location: Arlington, VA. Hybrid (50/50); must be local to come on-site as needed.
In this role, you will:
Focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability.
Analyze samples and provide written technical reports related to the scope, nature, and characteristics of the malicious code.
Support active operations and be presented with cutting edge challenges in the malware arena.
Recommend counter measures to malware and other malicious type code and applications that exploit customer communication systems.
Conduct reverse engineering for known and suspected malware files.
Develop policies and procedures to investigate malware incidents for various computer networks.
#J-18808-Ljbffr
#J-18808-Ljbffr