Icon hamburger
US
What job do you want?
Apply to this job.
Think you're the perfect candidate?
Apply Now
Thumsup

You’re being taken to an external site to apply.

Enter your email below to receive job recommendations for similar positions.
M4468s6fy7k5b81jhb0

Remote Malware Reverse Engineer Lead

The Judge Group Charlotte Full-Time
$152,580.00 (Careerbuilder est.)
Apply Now

Note: Potentially remote for candidates that possess all of the required skills

We are seeking an experienced Malware Analyst/Reverse Engineer to perform malware analysis and reverse engineering in support of incident response, investigative analysis, threat hunting, and research on existing and emerging cyber threats. The role will involve in-depth analysis of static and behavioral analysis of complex malicious code utilizing various tools, including disassemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers. The candidate will perform the functions of malware analyst/reverse engineer and serve as a liaison for Threat Services for the Global Fusion Center, and mentor and collaborate with the threat hunting, incident handling/response, and forensics teams.

Key Responsibilities

  • Use expertise in malware analysis/reverse engineering to evaluate and analyze complex malicious code.
  • Perform reverse-engineering for suspected or known malware files, determining the TTPs associated with the code.
  • Develop custom tools designed to automate analysis.
  • Perform research around malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive actions.
  • Produce detailed reports identifying attributes and functionality of malware, and IOCs that can be used for malware identification/detection, to include behavior, identified infrastructure used for command and control, and mitigation techniques.
  • Assist in identifying (hunting) and profiling threat actors and TTPs.
  • Develop host and network based signatures to identify specific malware via heuristic and/or anomaly based detection methods.
  • Participate in formal technical briefing and proposals.
  • Perform as an Information Security SME in the several of the following areas:
  • Malicius code behavior
  • Threat Intelligence
  • Incident Respnse
  • Web Applicatin
  • Lg analysis (statistical modeling, correlation, pattern recognition, etc.Microsoft platform (Server, workstation, applications)
  • Key Responsibilities (Cont'd)
  • Open Systems platfrms (Linux, UNIX, VM Ware ESX)
  • Netwrking (firewalls, IDS/IPS, packet capture)
  • Databases (Oracle, SQL Server, DB2, IMS)

  • Providing mentorship and support to teammates regarding malicious file analysis/behavior, communication/rapport with other divisions and various levels of leadership, technical expertise, and career development.
  • Capable of identifying need & driving solutions, and providing guidance, in an autonomous manner.

Job Qualifications

  • Bachelors and/or Masters Degree in Engineering, Computers Science, or related field
  • 7+ years overall technical experience in either reverse engineering/malware analysis, threat intelligence, incident response, security operations, or related information security field.
  • 5+ years experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, RDBMS/NoSQL database administration, etc.
  • 2+ years experience in penetration testing or ethical hacking
  • 2+ years experience with reverse engineering tools like IDA Pro, Ghidra, OllyDbg, Windbg, and Wireshark.
  • 2+ years experience of Python scripting to automate analysis and reverse engineering tasks (and Bash or Powershell or PerlC/C++).
  • 2+ years experience of x86, ARM, and x64 architectures.
  • Ability to reverse engineer binaries of various types including: x86, x64, C, C++, and .NET.
  • Strong understanding of Windows Operating System Internals, Windows APIs, and writing and analyzing DLLs.
  • Recent experience developing custom software and hardware tools to assist in performing reverse engineering and vulnerability analysis.
  • Strong understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc.

Experience with security operations tools, including but not limited to:

  • SIEM (e.g. Splunk, ArcSight)
  • Indicatr management (e.g. ThreatConnect)
  • Link/relatinship analysis (e.g. Maltego, IBM i2 Analyst Notebook)
  • Signature develpment/management (e.g. Snort rules, Yara rules)
 

Recommended skills

Information Security
Transport Layer Security
Penetration Testing
.Net Framework
White Hat
Incident Response

Location

CareerBuilder Estimated Salary What is the Careerbuilder Estimated Salary? Only about 20% of the jobs in our search results contain salary information. When a job posting doesn’t include a salary, we estimate it by looking at similar jobs in the same industry in that location. It is not necessarily endorsed by the employer and actual compensation may vary based on your experience.

x

What is the Careerbuilder Estimated Salary?

Only about 20% of the jobs in our search results contain salary information. When a job posting doesn’t include a salary, we estimate it by looking at similar jobs in the same industry in that location. It is not necessarily endorsed by the employer and actual compensation may vary based on your experience.
This estimation is based on Job title, Industry, Location and Skills
$152,580
Avg. Yearly Salary

Career Path

See the next step in your career
Remote Malware Reverse Engineer Lead
$152,580.00 (Careerbuilder est.)
Estimated Salary: $100K
Apply to this job.
Think you're the perfect candidate?
Apply Now

Help us improve CareerBuilder by providing feedback about this job: Report this job

Report this Job

Once a job has been reported, we will investigate it further. If you require a response, submit your question or concern to our Trust and Site Security Team

Job ID: 626749

CAREERBUILDER TIP

For your privacy and protection, when applying to a job online, never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction. Learn more.

By applying to a job using CareerBuilder you are agreeing to comply with and be subject to the CareerBuilder Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.