At Allstate, great things happen when our people work together to protect families and their belongings from life's uncertainties. For more than 90 years, our innovative drive has kept us ahead of our customers' evolving needs, from advocating for seat belts and airbags to leading in pricing sophistication, telematics, and device and identity protection.
Job Description
The Allstate Information Security (AIS) department manages cyber security at Allstate, covering Governance/Risk/Compliance, Access Management, Network Security, and Threat Response Services. The department ensures the confidentiality, integrity, and availability of Allstate systems.
We are seeking an experienced Malware Analyst/Reverse Engineer to perform malware analysis and reverse engineering to support incident response, investigative analysis, threat hunting, and research on cyber threats. The role involves analyzing static and behavioral aspects of malicious code using tools like disassemblers, debuggers, hex editors, unpackers, virtual machines, and network sniffers. The individual will serve as a malware analyst/reverse engineer, liaise with Threat Services for the Global Fusion Center, and mentor teams involved in threat hunting, incident response, and forensics.
Key Responsibilities
Utilize expertise in malware analysis/reverse engineering to evaluate complex malicious code.
Perform reverse engineering on suspected or known malware to determine TTPs.
Develop custom tools to automate analysis processes.
Research malicious software, vulnerabilities, and exploitation tactics; recommend preventative measures.
Produce detailed reports on malware attributes, behaviors, infrastructure, IOCs, and mitigation techniques.
Assist in threat actor profiling and TTP identification.
Develop signatures for host and network-based detection of malware.
Participate in technical briefings and proposals.
Serve as an SME in areas like malicious code behavior, threat intelligence, incident response, web applications, programming languages, OS platforms, and networking.
Mentor and support teammates in malicious file analysis and communication with leadership.
Identify needs, drive solutions, and provide guidance autonomously.
This role does not have supervisory duties.
Key Qualifications
5+ years of experience in reverse engineering, malware analysis, threat intelligence, incident response, or related fields.
2+ years of direct experience in malware reverse engineering.
2+ years in penetration testing, ethical hacking, exploit writing, or vulnerability management.
Proficiency with tools like IDA Pro, Ghidra, OllyDbg, WinDbg, BinaryNinja.
Ability to reverse engineer binaries in various formats and architectures.
Deep understanding of CPU architectures, Windows internals, APIs, and DLL analysis.
Strong programming skills in Python, Bash, PowerShell, Perl, C/C++, Go.
Experience developing custom tools for reverse engineering and vulnerability analysis.
Excellent analytical, problem-solving, and research skills.
Understanding of large corporate network environments.
Strong communication, documentation, and interpersonal skills.
Leadership and mentorship abilities.
Bachelor's degree preferred.
Relevant certifications like GREM, CISSP, OSCE, OSCP, CREST CRT, CEH are advantageous.
Skills
Cyber Incident Response, Threat Hunting, Security Operations, Penetration Testing, Stakeholder Management
Compensation
Annual salary ranges from $95,700 to $170,925, based on experience and qualifications.
The candidate will be required to undergo a background check. Allstate generally does not sponsor visas for this role.
Additional policies regarding veteran status, fair chance ordinances, and equal employment opportunity are in place, as detailed in the original description.
#J-18808-Ljbffr
See details and apply
Malware Analyst Reverse Engineer