Jr. Malware Reverse Engineer jobs in United States
cer-icon
Apply on Employer Site
company-logo

Peraton · 3 months ago

Jr. Malware Reverse Engineer

Peraton is a next-generation national security company that drives missions of consequence spanning the globe. They are seeking a Junior Malware Reverse Engineer to support a long-term government customer by analyzing and reverse-engineering malicious binaries and providing technical reports.

Information TechnologyRobotics
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability
Analyze samples and provide a written technical report related to the scope, nature, and characteristics of the malicious code
Support active operations and present you with cutting edge challenges in the malware arena
Recommend counter measures to malware and other malicious type code and applications that exploit customer communication systems
Conduct reverse engineering for known and suspected malware files
Develop policies and procedures to investigate malware incidents for various computer networks

Qualification

Malware analysisReverse engineeringStaticDynamic analysisDebugging experienceDisassemblers experienceOperating systems knowledgeCountermeasure recommendationsJavaCC++.NETPowerShellGolangC#ICS/SCADATechnical report writingSoft skillsTeam collaborationProblem-solvingCommunication skills

Required

Bachelor's degree and a minimum of 5 years related technical experience; or a Master's and minimum of 3 years' experience. An additional 4 years of experience may be substituted in lieu of degree
Experience with and the ability to examine malicious applications from a variety of operating systems such as Linux, Mac, Windows, IOS, Android operating systems, and IOT network devices
Knowledge of several of the following tools: Process Explorer, CFF Explorer, Wireshark, Fiddler, Regshot, Process Monitor, and Process Hacker
Knowledge of reverse engineering and file reconstruction practices
Ability to perform static and dynamic analysis of applications and scripts
Ability to unpack and de-obfuscate highly complex malicious applications
Debugging and Debugger experience (Experience identifying and defeating known or custom packers)
Disassembling/disassemblers experience
U.S. citizenship required
An Active Secret Security Clearance with the ability to obtain a TS/SCI is required
The selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment

Preferred

Knowledge of Java, C, C++, .NET, PowerShell, Golang, C#
Knowledge of ICS/SCADA systems

Benefits

Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual’s experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations.
Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.

Company

Peraton Fearlessly solving the toughest national security challenges.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Thomas Terjesen
Chief Information Officer
linkedin
Company data provided by crunchbase