Posted in: Maryland Science & Engineering Jobs
- - Employ engineering techniques and processes to analyze software to identify vulnerabilities.
- - Re-create programs to rebuild something similar to it, exploits its weaknesses, or strengthens its defenses.
- - Develop design specifications by inspection and analysis to offset various malware and to protect and defend infrastructure.
- - Develop, research, and maintain proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption.
- - Conduct vulnerability assessments/penetration tests of information systems.
- - Ensure software standards are met; designs, develops, documents, tests, and debugs applications software and systems that contain logical and mathematical solutions.
- - Perform in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities.
- - Participate in formal technical briefing and proposals.
- - Perform system analysis, reverse engineering, and static, dynamic, and best-practice malware analytical methodologies on Windows, Android, or UNIX-based platforms.
- - Provide in-depth understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.), malware and programming skills to include C/C++ and Assembly language, and detailed understanding of how network-based attacks work at the operating system and/or protocol level.
- - Minimum of 10 years of experience
- - Minimum of Bachelor’s Degree from an accredited college or university in Computer Engineering, Computer Science, Cybersecurity, Computer Engineering, or related discipline.
- - A minimum of DOD 8140/DOD 8570 IASAE Level II or CND.
- - Strong attention to detail and organizational skills.
- - Excellent communications skills.
An ACTIVE security clearances is required: TS/SCI with Polygraph:
The most qualified candidates will have experience with the following:
- - IDA Pro (tool for reverse engineering malware)
- - OllyDdg (tool for debugging malware)
- - REMnux (software for reverse engineering malware)
- - EnCase (forensic analysis tool)
- - Malware Analysis
- - 80386 Assembly Language Programming
- - Linux Assembly Language Programming
- - C/C++ Programming
- - Reverse Engineering/Disassembly
- - Intrusion analysis
- - Incident response
- - Forensic analysis
- - Behavioral, dynamic, and static analysis of malware
- - Building and configuring malware analysis labs
- - Network incident response
- - Forensics analysis of hard drives, systems, and networks
- - Threat intelligence analysis