Principal / Senior Principal Cyber Malware Engineer

Northrop Grumman Fort Gordon , GA 30905

Posted 6 months ago

Northrop Grumman Mission Systems is actively seeking an experienced Cyber Malware Engineer Professional to fill a role that requires a broad array of knowledge and skills working with team members to support a Cyber Security program located at Ft. Gordon, GA.

We're looking for a highly motivated individual with an impeccable work ethic and a strong ability to work in a collaborative fast-moving dynamic team environment working in the area of malware reverse engineering / cyber forensic engineering.

In this position you will:

This position involves developing solutions to national security threats with analysis that may involve reverse engineering or vulnerability research of network and communication systems. The position requires solid software analysis skills including a strong knowledge of tools used for malware analysis such as debuggers and disassemblers.

This position may be filled at a higher grade based on the qualifications below

This requisition may be filled at either a Principal or Senior Principal Cyber Malware Engineer

Basic Qualifications:

  • Education/Experience for Principal: Five (5) Years of experience with Bachelors in Science; Three (3) Years with Masters; Zero (0) Years with PhD / Four (4) years of additional experience can be substituted in lieu of college degree

  • Education/Experience for Senior Principal: Nine (9) Years of experience with Bachelors in Science; Seven (7) Years with Masters; Four (4) Years with PhD / Four (4) years of additional experience can be substituted in lieu of college degree

Basic Qualifications for Both Levels:

  • US Citizenship required and must have a Department of Defense Top Secret/SCI security clearance which was active in last 24 months

  • Must possess or be able to obtain DoD 8570 Certification for IAT Level II/IAM Level I or higher within two (2) months of starting (reference: http://iase.disa.mil/iawip/Pages/iabaseline.aspx for list of qualified certifications)

  • Analyzes and assesses infrastructures for potential vulnerabilities that may result from improper configurations, hardware or software flaws, or operational weaknesses

  • 2 years IDA Pro (or similar tool)

  • 2 years in debugging and performance tools (windbg/gdb/hexrays/valgrind)

  • Experience with virtualized development and testing environments

  • Ability to quickly make prioritizations and determinations that lead to actionable decisions.

  • Skilled teammate to work together with a team to produce results quickly

  • Ability to communicate technically complex problems to various audiences.

  • When required, have the ability to work outside of normal working hours and weekends as needed to support the customer's needs

  • Be able to support infrequent CONUS travel to user locations for assistance

  • Strong verbal and written communication skills

  • Must be able to work in a fast-paced environment

Preferred Qualifications for Both Levels:

  • DoD 8570 Certification for IAT Level III / IAM Level II

  • Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques.

  • Detailed understanding of computer networking (e.g. TCP/IP, HTTP, SSL)

  • Strong Understanding of Windows internals: XP, Vista, Win8, Win10 and APIs

  • Capable of Python scripting to automate analysis and reverse engineering tasks

  • Strong knowledge of tools used for malware analysis such as debuggers and disassemblers

  • Be able to create documentation detailing attack capabilities of malware specimens

  • Experience analyzing malware during execution and to reverse engineer complied code

  • Experience working in hybrid clouds

  • Ability to navigate and use a hybrid cloud to enhance workflows and analysis

  • Experience with commercial tool like EnCase, XWay, or Binary Ninja

  • Experience with Open source tools such as Binary ninja, Radare2, Metasploit, and OWASP Zap

  • Familiarity with Atlassian Stack and VMware products

  • Functional experience working with military / Department of Defense software development community a plus

  • Ability, willingness and desire to train software programmers and developers in malware and vulnerability analysis and tools

  • Experience in IOT debugging and reverse engineering

  • iOS/Android experience in vulnerability research

  • Participation and success in previous cyber flag exercises.

  • Experience with non x86 architectures like ARM, MIPS and Power PC

  • Experience with dynamic analysis using virtualization

  • Experience with writing indication of compromise for YARA, Snort, Etc.

  • Experience researching vulnerabilities and exploits

Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit www.northropgrumman.com/EEO. U.S. Citizenship is required for most positions.


icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Principal Cyber Protection Analyst Ts/Sci

Northrop Grumman

Posted 1 week ago

VIEW JOBS 10/3/2019 12:00:00 AM 2020-01-01T00:00 As a leading global security company providing innovative systems, products and solutions to customers worldwide, Northrop Grumman offers an extraordinary portfolio of capabilities and technologies. Here at Northrop Grumman we are comprised of professionals that bring different perspectives, are curious about the world, accepting of each other, and understand that the more ideas, backgrounds, and experiences we bring to our work then the more innovative we can be. As we continue to build our talented workforce we look for professionals that exemplify our core values, leadership characteristics, and approach to innovation. Do you desire a patriotic role and the chance to defend our nation's Cyber Infrastructure? Do you enjoy learning about new technologies and how they can be used to provide cutting edge services to our customers? If so, then look to join the Northrop Grumman team. Northrop Grumman is seeking a Principle Cyber Threat Analyst to join our team of qualified, diverse individuals. This position will be located in Fort Gordon, GA. Position may require initial temporary support in Fort Belvoir, VA, as need by the Program. Roles and Responsibilities: * Provide operations for persistent monitoring on a 24/7 basis of all designated networks, enclaves, and systems using network, host and correlation based detection systems. * Interpret, analyzes, and reports all events and anomalies in accordance with Computer Network directives, including initiating, responding, and reporting discovered events. * Provide summary reports of network events and activities and delivers metric reports. * Perform vulnerability analysis and exploitation of applications, operating systems or networks. * Identifies intrusion or incident path and method. * Evaluate system security configurations and analyze findings to perform root cause analysis. * Contributes to the design, development and implementation of countermeasures, system integration, and tools specific to Cyber and Information Operations. * May prepare and presents technical reports and briefings. Basic Qualifications: * Bachelor's Degree and 5 years of related experience (OR 4 years of experience may be substituted in lieu of educational requirement with a High school Diploma or GED). * Familiar with Cyber warfare techniques, methods and processes. * Experience detecting, monitoring, analyzing or mitigating cyber threats. * Must possess a DoD 8570 IAT Level II Certification (examples include: CCNA-Security, CySA , GICSP, Security CE, or SSCP) * Must possess a DoD 8570 CSSP Analyst Certification (examples include: CEH, CFR, CCNA Cyber Ops, CCNA-Security, GCIA, GCIH, GICSP, or SCYBER) * Must have an current active TS/SCI Clearance (or higher). Preferred Qualifications: * Experience identifying events of interest from tools such as Tanium, ArcSight and other related tools. * Familiarity with CJCSM 6510.01B * Experience writing and sharing technical summaries and reports to both technical and non-technical audience. * Ability to correlate data from multiple data sources to create a more accurate picture of cyber threats and vulnerabilities. Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit www.northropgrumman.com/EEO. U.S. Citizenship is required for most positions. #ARCyber Northrop Grumman Fort Gordon GA

Principal / Senior Principal Cyber Malware Engineer

Northrop Grumman