Reston, VA

Cyber Malware Reverse Engineer

Required Security Clearance: Top Secret/SCI


City: Reston


State/Territory: Virginia


Travel: None


Potential for Teleworking: No


Schedule: Full Time


DoD 8570 IAT Requirement: IAT II (Security+, CySA+, CCNA Security, GICSP, GSEC, SSCP)


DoD 8570 IAM Requirement: None


DoD 8570 IASAE Requirement: None


DoD CSSP Requirement: CSSP Incident Responder (CySA+, CEH, CFR, GCFA, GCIH, SCYBER)

Designs and evaluates end-to-end systems through their entire life cycle. Ensures products and systems comply with requirements and customer information assurance and cybersecurity standards and practices through formal verification methods with specific emphasis on network operations and cyber warfare tactics. Job Description

  • Expertise in reverse engineering malware, and familiarity with today’s tools and operational needs.
  • Ability to identify vulnerabilities in software and hardware, analyze and reverse engineer software and hardware systems
  • The successful applicant should be expected to identify potential cyber threats, determine levels of risk, and produce analytical reports for a variety of audiences. You will occasionally be required to present your findings in front of senior executives, so the ability to translate technical indicators into layperson’s terms is vital.
  • Outstanding problem-solving skills are essential. When serious threats are identified, you will work closely with other areas of the security team to identify appropriate solutions. You must be passionate about technology, and able to learn the ropes of new security solutions rapidly.
  • Recognize common behavior patterns that are primarily found in malware.
  • Knowledge of debuggers and disassemblers
  • Familiarity with linkers and loaders
  • Indicators of Compromise (IOC)s will be obtained through: forensic analysis of digital information, Open Source Intel (OSINT) review/monitoring, available tools both customer provided and free, and pivoting/researching on previously reported IOCs.
  • Must have common knowledge of standard network infrastructure.
  • Other items that would be good to know: domain masquerading, certificates, and file hashing.
  • Familiar with monitoring emerging threats through Tools, Techniques, and Procedures (TTPs) and how they relate to the MITRE ATT&CK framework
  • Participate in collaborative sessions with other CNDSPs and IC agencies on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data.
  • Assist in the development of IOCs for active defensive countermeasures and passive detection signatures.
  • Good written communications skills are necessary in order to properly document and report the identification and sharing of newly identified IOCs.
  • Attention to detail and ability to work with team-members and independently.
Standard Characteristics
  • Identify and report detected events through persistent monitoring and analysis of indications and warnings (I&W) and attack, sensing, and warning (AS&W) indicators
  • Respond to identified network or system cyber incidents
  • Analyze, contain, eradicate malicious code
  • Prepare and disseminate AS&W to enterprise and the CND-SP community
  • Conduct cyber trend analysis as well as malware analysis
  • Disseminate and report cyber related activities and trends
  • Support or conduct CND/CI coordination and reporting to the organization, DoD, and IC
Skills and Tasks
  • Exceptionally Complex, Inter-Discipline, Inter-Organizational.
  • Can perform tasks of senior level technicians, specialists, and or managers not performed at Level 3 due to the size and/or complexity of the tasks.
Leadership/Management
  • May work individually or as a key member of a senior leadership team.
  • Oversees and monitors performance across several disciplines, and when required, takes steps to resolve issues.
Guidance
  • Provides expert guidance and direction to Government and Vendor senior level technicians and managers.
  • Directs multiple contractor and subcontractor teams through to project completion.
Training and Certifications
  • DoD 8570 compliance or information assurance certification commensurate with technical objectives and services required within the task order.
  • Applicable software or hardware training and certifications commensurate with the technical objectives, services required, and IT environment specified within the task order.
Capabilities and additional Requirements
  • Apply Standard Characteristics of Labor Category Capability Levels.
Education and Experience
  • HS/GED + 12 years
  • Associates Degree + 10 years
  • Bachelor’s Degree + 8 years
  • Master’s Degree + 6 years
  • PhD + 4 years

Recommended Skills

  • Attention To Detail
  • Code Of Federal Regulations
  • Communication
  • Computer Architectures
  • Formal Verification
  • Giac Certified Forensics Analyst
Browse other jobs