Mid-level Malware Reverse Engineer jobs in United States
cer-icon
Apply on Employer Site
company-logo

Peraton · 13 hours ago

Mid-level Malware Reverse Engineer

Peraton is a next-generation national security company that drives missions of consequence spanning the globe. They are currently seeking an experienced Mid-level Malware Reverse Engineer to support a long-term government customer with the Federal Strategic Cyber group, focusing on analyzing and reverse-engineering malicious binaries and providing technical reports.

Information TechnologyRobotics
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability
Analyze samples and provide written technical reports related to the scope, nature, and characteristics of the malicious code
Support active operations and be presented with cutting edge challenges in the malware arena
Recommend counter measures to malware and other malicious type code and applications that exploit customer communication systems
Conduct reverse engineering for known and suspected malware files
Develop policies and procedures to investigate malware incidents for various computer networks

Qualification

Malware analysisReverse engineeringStaticDynamic analysisPythonDebuggingDisassemblingOperating systems knowledgeTechnical writingTeam collaboration

Required

Bachelor's degree and 8 years of related technical experience, or a Master's and minimum of 6 years' experience. An additional 4 years of experience may be substituted in lieu of degree
Experience with and the ability to examine malicious applications from a variety of operating systems such as Linux, Mac, Windows, IOS and Android operating systems, and IOT network devices
Knowledge of several of the following tools: Ida-Pro, Ollydbg, X64dbg, Scyllax64, Objdump, Readelf, Ghidra, Process Explorer, CFF Explorer, Wireshark, Fiddler, Regshot, Process Monitor, and Process Hacker
Knowledge of reverse engineering and file reconstruction practices
Ability to perform static and dynamic analysis of applications and scripts
Ability to unpack and de-obfuscate highly complex malicious applications
Debugging and Debugger experience (Experience identifying and defeating known or custom packers)
Disassembling/disassemblers experience
U.S. citizenship required
An Active Top Secret security clearance with the ability to obtain SCI
The selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment

Preferred

Experience with Python
Knowledge of Java, C, C++, .NET, PowerShell, Golang, C#
Knowledge of ICS/SCADA systems

Benefits

Medical
Dental
Vision
Life
Health savings account
Short/long term disability
EAP
Parental leave
401(k)
Paid time off (PTO) for vacation
Company paid holidays

Company

Peraton Fearlessly solving the toughest national security challenges.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Thomas Terjesen
Chief Information Officer
linkedin
Company data provided by crunchbase