Malware Engineering, Advisor

Job Locations US-VA-Chantilly
Requisition ID
2024-150140
Position Category
Cyber Security
Clearance
Top Secret/SCI w/Poly

Responsibilities

Peraton is currently looking for Malware Reverse Engineer to support one of our longstanding customers. The primary responsibility will focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability. The Malware Reverse Engineer will analyze samples and provide a written technical report related to the scope, nature, and characteristics of the malicious code.

 

Uses expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code using tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers. Conducts reverse engineering for known and suspected malware files. Investigates instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration. Provides detailed reports of any findings. Performs research in malicious software, vulnerabilities, and exploitation tactics. Identifies vulnerabilities in binaries, identifies and analyzes shellcode, and recommends preventative or defensive actions. Reverse-engineers malware and incorporates analysis results into detailed reporting to include behavior, identified infrastructure used for command and control, and mitigation techniques. Develops network and host-based signatures to identify specific malware. Recommends heuristic or anomaly-based detection methods. Compares malware to existing malware signatures.

Qualifications

Qualifications

  • Bachelor’s Degree or equivalent work experience in Information Systems or related field
  • 4 years of experience in Malware Analysis, Reverse Engineering or related efforts
  • Proficiency with a disassembler like IDA Pro or Ghidra and debuggers like OllyDbg, x64Dbg, Immunity, etc.
  • Experience identifying and defeating known or custom packers
  • 200 hours of formal, accredited training in related technical specialty fields
  • Active TS required to start (with eligibility for SCI and Poly)
  • Associates degree and 10+ years of experience; OR Bachelor’s degree and 8+ years of experience; OR Master’s Degree and 6+ years of experience. Or 3 years with PhD. However, four (4) years of additional relevant experience or specialized training will be considered in lieu of a Bachelor’s degree.

 

Preferred Skills

  • Experience with:
  • Multiple Assembly Languages
  • Other Operating System file formats, such as ELF, Mach-O, and APK
  • Python and other programming or scripting languages
  • Cryptography

 

Peraton offers enhanced benefits to employees working on this critical National Security program, which include heavily subsidized employee benefits coverage for you and your dependents, 25 days of PTO accrued annually up to a generous PTO cap and eligibility to participate in an attractive bonus pla

Peraton Overview

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted, highly differentiated solutions and technologies to protect our nation and allies. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace. The company serves as a valued partner to essential government agencies and supports every branch of the U.S. armed forces. Each day, our employees do the can’t be done by solving the most daunting challenges facing our customers. Visit peraton.com to learn how we’re keeping people around the world safe and secure.

Target Salary Range

$112,000 - $179,000. This represents the typical salary range for this position based on experience and other factors.

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed