Malware Reverse Engineer Junior Level - 32127

Alion Science And Technology Linthicum Heights , MD 21090

Posted 2 months ago

Job Description:

With more than 80 years of experience engineering science and technology solutions to support national security, Alion supports clients with big ideas and real solutions.

JOB SUMMARY: Under supervision and guidance, the Malware Reverse Engineer

  • Junior Level will assist Defensive Cyber Operations (DCO) and Offensive Cyber Operations (OCO) analysts with complex analysis of forensic, event and signature data as well as binary, mobile, executable code leading to the detection of a variety of threat types including malware and potentially advanced persistent threats. Under supervision and guidance, the Malware Reverse Engineer

  • Junior Level will document the analysis techniques in a triage database to assist others in timely kill chain analysis. Under supervision and guidance, the Malware Reverse Engineer

  • Junior Level will capture and perform initial analysis on captured volatile data, log data, captured network traffic data, to identify any immediate intrusion related artifacts which in turn will allow immediate defensive countermeasures to be implemented. Under supervision and guidance, the Malware Reverse Engineer

  • Junior Level will develop necessary procedures or scripts to identify such data. Under supervision and guidance, the Malware Reverse Engineer

  • Junior Level will use both static and dynamic tools/techniques to analyze and reverse-engineer malware.

Professional Experience and Education

  • A Bachelor's Degree in computer science, computer engineering, or information systems or related discipline with 2 years of demonstrated experience. In lieu of a degree, six (6) years of demonstrated experience is required.

    1. Ability to develop code that takes advantages of a weakness in an operating system, application or any other software code, including application plug-ins. Familiar with disassembly tools and able to develop functional exploits; Create custom shellcode; develop code that can bypass typically security measures; experience with ring 0 programming.


    1. The ability to understand and create code in C, and Python or JavaScript.


    1. Demonstrated experience and/or training in using both static and dynamic tools/techniques to analyze and reverse-engineer malware, to include: Binary Ninja, Immunity Debugger, Ollydbg, Windbg, Ida Pro, and/or Ghidra.

  • CJ

Security Clearance: Top Secret/Sensitive Comp Info

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Malware Reverse Engr Expert Level 31868

Alion Science And Technology

Posted 2 months ago

VIEW JOBS 10/14/2020 12:00:00 AM 2021-01-12T00:00 Job Description With more than 80 years of experience engineering science and technology solutions to support national security, Alion supports clients with big ideas and real solutions. (U) JOB SUMMARY: The Malware Reverse Engineer - Expert Level will independently support DCO/OCO analysts with complex analysis of forensic, event and signature data as well as binary, mobile, executable code leading to the detection of a variety of threat types including malware and potentially advanced persistent threats. The Malware Reverse Engineer - Expert Level will document the analysis techniques in a triage database to assist others in timely kill chain analysis. The Malware Reverse Engineer - Expert Level will capture and perform initial analysis on captured volatile data, log data, captured network traffic data, to identify any immediate intrusion related artifacts which in turn will allow immediate defensive countermeasures to be implemented. The Malware Reverse Engineer - Expert Level will independently develop necessary procedures or scripts to identify such data. The Malware Reverse Engineer - Expert Level will serve as the subject matter expert (SME) on malware detection, analysis and mitigation. The Malware Reverse Engineer - Expert Level will use both static and dynamic tools/techniques to analyze and reverse-engineer malware, and provide instruction and guidance to junior personnel. (U) Professional Experience and Education * A Master of Science degree in computer science, computer engineering, or information systems or related STEM discipline with twelve (12) years of demonstrated experience. In lieu of a degree, sixteen (16) years of demonstrated experience is required. * Ability to develop code that takes advantages of a weakness in an operating system, application or any other software code, including application plug-ins. Expert knowledge with disassembly tools and able to develop functional exploits; Create custom shellcode; develop code that can bypass typically security measures; experience with ring 0 programming. * The ability to understand and create code in C, and Python or JavaScript. * Demonstrated experience and/or training in using both static and dynamic tools/techniques to analyze and reverse-engineer malware, to include: Binary Ninja, Immunity Debugger, Ollydbg, Windbg, Ida Pro, and/or Ghidra. Security Clearance: Top Secret/Sensitive Comp Info Alion Science And Technology Linthicum Heights MD

Malware Reverse Engineer Junior Level - 32127

Alion Science And Technology