Logo
IC-CAP

Cyber Malware Reverse Engineer 104-025 with Security Clearance

IC-CAP, Reston, Virginia, United States

Save Job

Cyber Malware Reverse Engineer: Job Description Summary: You'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow. As a Cyber Malware Reverse Engineer, you will help ensure today is safe and tomorrow is smarter. Level 6: * Investigates, analyzes, and responds to cyber incidents within a network environment or enclave. * Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. Interprets, analyzes, and reports all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events. * Evaluates, tests, recommends, coordinates, monitors, and maintains cybersecurity policies, procedures, and systems, including access management for hardware, firmware, and software. * Ensures that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with cybersecurity standards. * Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security. * Researches and evaluates new concepts and processes to improve performance. * Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks. * May serve as a team or task lead. HOW A CYBER MALWARE REVERSE ENGINEER WILL MAKE AN IMPACT: * Work will provide customer understanding of current malware and how to apply appropriate countermeasures. * Indicators of Compromise (IOC)s will be obtained through: forensic analysis of digital information, Open-Source Intel (OSINT) review/monitoring, available tools both customer provided and open source, and pivoting/researching on previously reported IOCs. * Participate in collaborative sessions with other CNDSPs and IC agencies on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data.

* Day or Swing shift position available. Ability to identify vulnerabilities in software and hardware, analyze and reverse engineer software and hardware systems * Attention to detail and ability to work with team-members and independently. * Must have common knowledge of standard network infrastructure. * Familiar with monitoring emerging threats through Tools, Techniques, and Procedures (TTPs) and how they relate to the MITRE ATT&CK Framework * Knowledge of debuggers and disassemblers and familiar with linkers and loaders * Knowledge of domain masquerading, certificates, and file hashing. * Strong written communications skills are necessary to properly document and report the malware. Education and Experience: * HSD/GED+16yrs * Associates+14yrs * Bachelors+12yrs * Masters+10yrs * PhD+8yrs * Relevant professional certifications will be considered equivalent to six (6) months of relevant experience. Training and Certifications: * GIAC Reverse Engineering Malware (GREM) or equivalent. * Security Clearance: * DoD Approved Clearance and Poly