Northrop Grumman Mission Systems is actively seeking an experienced Cyber Malware Engineer Professional to fill a role that requires a broad array of knowledge and skills working with team members to support a Cyber Security program located at Ft. Gordon, GA.
We're looking for a highly motivated individual with an impeccable work ethic and a strong ability to work in a collaborative fast-moving dynamic team environment working in the area of malware reverse engineering / cyber forensic engineering.
In this position you will:
This position involves developing solutions to national security threats with analysis that may involve reverse engineering or vulnerability research of network and communication systems. The position requires solid software analysis skills including a strong knowledge of tools used for malware analysis such as debuggers and disassemblers.
This position may be filled at a higher grade based on the qualifications below
This requisition may be filled at either a Principal or Senior Principal Cyber Malware Engineer
Education/Experience for Principal: Five (5) Years of experience with Bachelors in Science; Three (3) Years with Masters; Zero (0) Years with PhD / Four (4) years of additional experience can be substituted in lieu of college degree
Education/Experience for Senior Principal: Nine (9) Years of experience with Bachelors in Science; Seven (7) Years with Masters; Four (4) Years with PhD / Four (4) years of additional experience can be substituted in lieu of college degree
Basic Qualifications for Both Levels:
US Citizenship required and must have a Department of Defense Top Secret/SCI security clearance which was active in last 24 months
Must possess or be able to obtain DoD 8570 Certification for IAT Level II/IAM Level I or higher within two (2) months of starting (reference: http://iase.disa.mil/iawip/Pages/iabaseline.aspx for list of qualified certifications)
Analyzes and assesses infrastructures for potential vulnerabilities that may result from improper configurations, hardware or software flaws, or operational weaknesses
2 years IDA Pro (or similar tool)
2 years in debugging and performance tools (windbg/gdb/hexrays/valgrind)
Experience with virtualized development and testing environments
Ability to quickly make prioritizations and determinations that lead to actionable decisions.
Skilled teammate to work together with a team to produce results quickly
Ability to communicate technically complex problems to various audiences.
When required, have the ability to work outside of normal working hours and weekends as needed to support the customer's needs
Be able to support infrequent CONUS travel to user locations for assistance
Strong verbal and written communication skills
Must be able to work in a fast-paced environment
Preferred Qualifications for Both Levels:
DoD 8570 Certification for IAT Level III / IAM Level II
Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques.
Detailed understanding of computer networking (e.g. TCP/IP, HTTP, SSL)
Strong Understanding of Windows internals: XP, Vista, Win8, Win10 and APIs
Capable of Python scripting to automate analysis and reverse engineering tasks
Strong knowledge of tools used for malware analysis such as debuggers and disassemblers
Be able to create documentation detailing attack capabilities of malware specimens
Experience analyzing malware during execution and to reverse engineer complied code
Experience working in hybrid clouds
Ability to navigate and use a hybrid cloud to enhance workflows and analysis
Experience with commercial tool like EnCase, XWay, or Binary Ninja
Experience with Open source tools such as Binary ninja, Radare2, Metasploit, and OWASP Zap
Familiarity with Atlassian Stack and VMware products
Functional experience working with military / Department of Defense software development community a plus
Ability, willingness and desire to train software programmers and developers in malware and vulnerability analysis and tools
Experience in IOT debugging and reverse engineering
iOS/Android experience in vulnerability research
Participation and success in previous cyber flag exercises.
Experience with non x86 architectures like ARM, MIPS and Power PC
Experience with dynamic analysis using virtualization
Experience with writing indication of compromise for YARA, Snort, Etc.
Experience researching vulnerabilities and exploits
Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit www.northropgrumman.com/EEO. U.S. Citizenship is required for most positions.