This individual not only has to be able to understand malware, but is required to look through massive embedded programming logic to understand what that code is doing, how it controls the host of components within the device and then determine if an exploit or vulnerability exists. For network penetration folks, the malware tends to come in a stand-alone attachment or embedded into a document, for us, it is hidden in the midst of unknown / undocumented programming logic.
We are looking for someone who falls somewhere in the realm of reverse engineering for cyber threat detection, malware analyst, programmer, firmware analyst etc. for an immediate opening with our client in Maryland. Assembly language and C language experience is desired but not necessarily going to rule a candidate out. This is a lab position with time and resources available to expand software language and firmware skills. The firmware and software extraction will typically be performed by an electrical, cyber or forensics engineer they will be teamed with.
- Top Secret security clearance, SCI eligible; active TS/SCI preferred
- DoD 8570 Level II certification; Security+ CE preferred
- 4 years’ work experience + Bachelor’s Degree, 2 years’ (or less) work experience + Master’s or Ph.D., or 8 years’ work experience in lieu of degree
- The ability to work effectively with people at all levels
- Possess excellent oral and written communications skills
- Have strong organization and time management skills
- The ability to work at a high operational tempo and in crisis situations