Malware Reverse Engineer
CodeHunter
- USA
- Permanent
- Full-time
- Conduct a thorough analysis of malware, including the creation of detailed analysis reports.
- Track ongoing malware campaigns, identify malicious actors, and document related infrastructure.
- Develop custom tools and scripts to facilitate and expedite malware analysis tasks.
- Handle internal escalations concerning potentially malicious files and websites.
- Occasional travel may be required for field investigations and continued professional development.
- Four years of strong, hands-on experience in malware analysis.
- Proficiency in using reverse engineering tools such as IDA Pro, x64dbg, OllyDbg, Immunity Debugger, or Ghidra.
- Intermediate to advanced skills in reverse engineering malware code, written in languages like C, C++, Visual Basic, Java, .NET, Delphi, JavaScript, and VBScript.
- Solid background in C++ programming and Win32 APIs.
- Demonstrated capability in creating malware analysis tools and scripts for tasks like malware unpacking and configuration extraction.
- Innovation in tracking the evolution of malware families, their infrastructure, and associated campaigns.
- Knowledge of network traffic analysis and familiarity with networking protocols like TCP/IP, HTTP/HTTPS, FTP, and IRC
- Professional certifications such as GCIH, GREM, GCFA, or CISSP
- Experience in reversing encryption/obfuscation techniques
- Bachelor's degree
- Ability to travel on occasion
- 401K
- Health coverage
- Vision and dental coverage
- Company-sponsored training
- Parking or metro benefits
- Catered lunches
- Generous PTO policy