Senior Malware Engineer / Reverse Engineer

Saic (Science Applications Int.) Bethesda , MD 20813

Posted 3 months ago

Job Description

Description

SAIC has several immediate Senior Malware Engineer / Reverse Engineer openings on a newly awarded contract located in Bethesda! You would work in the Technical Exploitation Intelligence Support team which is critical in supporting DoD, Federal, and IC partners' Global War on Terrorism efforts. SAIC is building a team of malware engineers that have experience with threat actor tracking, malware analysis, and reverse engineering of malware. The primary responsibilities will focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability.

This position will include the following duities:

  • Isolates, reviews, analyzes, and reverse-engineers malicious binaries and/or code to determine functionality and capability

  • Conducts dynamic and static analysis of samples with emphasis on disassemblers

  • Perform static code analysis on malware samples to extract indicators

  • Analyzes multiple assembly and scripting languages, other operating system binaries (ex. ELF), web shells, and other file-specific malware such as Office or PDF malware

  • Analyze malware obtained from internal and external sources

  • Analyze endpoint telemetry for anomalous and malicious behavior

  • Applies expertise in discovering, analyzing, diagnosing, and reporting on malware events, files and network intrusion and vulnerability issues

  • Reverse engineers code from mobile devices

  • Creation of tools and scripts to assist in the analysis of malware analysis

  • Research malware families and threat groups to find new technical indicators and tactics, techniques, and procedures (TTPs) to be used for threat hunting efforts

  • Tracking malware campaigns, malicious actors, and related infrastructure

  • Recommends sound counter measures to malware and other malicious type code and applications which exploit customer communication systems

  • In-depth analysis of malware, including authoring analysis reports

  • As needed, research new trends, techniques, and packaging of malicious binaries and be able to identify zero-day exploits.

Qualifications

  • TS/SCI is required. A CI Poly is preferred or be willing and able to obtain a CI Poly.

  • Education: BS degree in Computer Science or Engineering (Software, Computer) or an additional 4 years of related expeirence

  • Advanced or Expert level experience in Malware Analysis/Reverse Engineering or Exploit Development

  • Advanced or Expert level experience analyzing mobile malware from devices running iOS or Android

  • Advanced or Expert level experience reverse engineering tools such as IDA Pro, x64dgb, OllyDbg, Immunity Debugger and/or Ghidra

  • Advanced or Expert level experience reverse engineering malware code written in C, C++, VisualBasic, Java, .NET, Delphi, JavaScript, and VBScript

  • Advanced or Expert level experience scripting languages, such as Python or Perl, assembly language experience, and experience with other operating system file formats, such as ELF binaries

  • Advanced or Expert level experience with computer forensic software tools such as EnCase, X-Ways, FTK, or Sleuth Kit/Autopsy.

DESIRED:

  • OSCP or SANS certifications; Project Experience with a focus on malware analysis, software analysis, and low-level programming

Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.

Overview

SAIC is a premier Fortune 500 technology integrator driving our nation's technology transformation. Our robust portfolio of offerings across the defense, space, civilian, and intelligence markets includes secure high-end solutions in engineering, digital, artificial intelligence, and mission solutions. Using our expertise and understanding of existing and emerging technologies, we integrate the best components from our own portfolio and our partner ecosystem to deliver innovative, effective, and efficient solutions that are critical to achieving our customers' missions.

We are more than 26,500 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer, fostering a respectful work culture based on diversity, equity, and inclusion that values all contributors. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $7.1 billion. For more information, visit saic.com.


icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Malware Engineer / Software Reverse Engineer

Engility Corporation

Posted 2 months ago

VIEW JOBS 10/7/2022 12:00:00 AM 2023-01-05T00:00 <p>SAIC has several immediate Malware Engineer / Reverse Engineer openings on a newly awarded contract located in Bethesda! SAIC is building a team of malware engineers that have experience with threat actor tracking, malware analysis, and reverse engineering of malware. You would work in the Technical Exploitation Intelligence Support team which is critical in supporting DoD, Federal, and IC partners' Global War on Terrorism efforts. The primary responsibilities will focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability.</p><p>Responsibilities include:</p><ul><li><p>Isolates, reviews, analyzes, and reverse-engineers malicious binaries and/or code to determine functionality and capability</p></li><li><p>Conducts dynamic and static analysis of samples with emphasis on disassemblers</p></li><li><p>Perform static code analysis on malware samples to extract indicators</p></li><li><p>Analyzes multiple assembly and scripting languages, other operating system binaries (ex. ELF), web shells, and other file-specific malware such as Office or PDF malware</p></li><li><p>Analyze malware obtained from internal and external sources</p></li><li><p>Analyze endpoint telemetry for anomalous and malicious behavior</p></li><li><p>Applies expertise in discovering, analyzing, diagnosing, and reporting on malware events, files and network intrusion and vulnerability issues</p></li><li><p>Reverse engineers code from mobile devices</p></li><li><p>Creation of tools and scripts to assist in the analysis of malware analysis</p></li><li><p>Research malware families and threat groups to find new technical indicators and tactics, techniques, and procedures (TTPs) to be used for threat hunting efforts</p></li><li><p>Tracking malware campaigns, malicious actors, and related infrastructure</p></li><li><p>Recommends sound counter measures to malware and other malicious type code and applications which exploit customer communication systems</p></li><li><p>In-depth analysis of malware, including authoring analysis reports</p></li><li><p>As needed, research new trends, techniques, and packaging of malicious binaries and be able to identify zero-day exploits.</p></li><li><p>TS/SCI is required. A CI Poly is preferred or be willing and able to obtain a CI Poly.</p></li><li><p>Bachelor degree or higher in a technical discipline or an equivalent amount of relevant work experience, and at least four (4) years of related experience.</p></li><li><p>14 years of overall professional experiene.</p></li><li><p>Intermediate to advanced experience in Malware Analysis/Reverse Engineering or Exploit Development</p></li><li><p>Intermediate to advanced experience analyzing mobile malware from devices running iOS or Android</p></li><li><p>Intermediate to advanced experience reverse engineering tools such as IDA Pro, x64dgb, OllyDbg, Immunity Debugger and/or Ghidra</p></li><li><p>Intermediate to advanced experience reverse engineering malware code written in C, C , VisualBasic, Java, .NET, Delphi, JavaScript, and VBScript</p></li><li><p>Intermediate to advanced with scripting languages, such as Python or Perl, assembly language experience, and experience with other operating system file formats, such as ELF binaries</p></li><li><p>Intermediate to advanced experience with computer forensic software tools such as EnCase, X-Ways, FTK, or Sleuth Kit/Autopsy.</p></li></ul> Engility Corporation Bethesda MD

Senior Malware Engineer / Reverse Engineer

Saic (Science Applications Int.)