The ideal candidate will have a strong understanding of malware analysis, reverse engineering, and data engineering. Additionally the ideal candidate will have a comprehensive background relative to database interactions, networking, ports protocols and data structures relative to exploitation.
This effort will require a skilled MA/RE to enable standardized and consistent processes, integration of innovative approaches to creating advanced tradecraft to support our clients mission. This position requires a strong understanding of process-driven forensics and the application of / and the development of best practices. The ideal candidate will be operationally focused.
Ã¢€Â¢ Skilled in (EnCase/Netwitness/NetFlow)
Ã¢€Â¢ EnCase, Netwitness, NetFlow, Malware Analysis experience
Ã¢€Â¢ Minimum four (4) years of experience in analysis, triage of advanced cyber threats.
Ã¢€Â¢ Using a high-level scripting/programming language to extract, de-obfuscate, or otherwise manipulate malware related data
Ã¢€Â¢ Experience in manual analysis of packed and obfuscated binaries
Ã¢€Â¢ Experience solving challenges related to anti analysis features malicious code
Ã¢€Â¢ Strong knowledge of low level, systems programming concepts in Windows and Linux and Mobile Operating Systems
Ã¢€Â¢ Strong understanding of exploits and shellcode
Ã¢€Â¢ Experience with kernel level debugging and kernel level rootkits
Ã¢€Â¢ Experience with tools like EnCase, FTK, Volatility
Ã¢€Â¢ Experience with log correlation utilities like SPLUNK or Elastic Search
Ã¢€Â¢ Experience reviewing network traffic logs to identify malicious activity