At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customers’ success. We empower our teams, contribute to our communities, and operate sustainable practices. Everything we do is built on a commitment to do the right thing for our customers, our people, and our community. Our Mission, Vision, and Values guide the way we do business. Employees enjoy career enrichment opportunities available through mobility and development and experience rewarding relationships with supportive supervisors and talented colleagues and customers. Your most important work is ahead.
If this sounds like the kind of environment where you can thrive, keep reading!
The Malware Reverse Engineer should be familiar with the utilization, configuration, and implementation of industry standard malware analysis including but not limited to static and dynamic tools and techniques, complex analysis of forensic, event and signature data as well as binary, mobile, and executable code leading to the detection of a variety of threat types including malware and potentially advanced persistent threat
Work hours are flexible though need to be within the customer’s core business hours of 0600-1800. On-call support/hours may be required.
- Analyze existing capabilities and develop automated technical solutions to enhance malware analysis capabilities.
- Develop, review, and maintain SOPs to reflect all aspects of malware analysis integration into SOC operations.
- Work collaboratively across detection, response, defensive and cyber threat intel functions to infuse malware analysis capabilities and workflows to defend the enterprise against threats
- Publish malware threat analysis cards based on internal findings which can be laterally shared through cyber intelligence fusion channels.
- Contribute to the content of a Threat Intelligence Platform (TIP) for collecting and inventorying malware patterns identified in the enterprise and collaborating with SIEM detection functions to ensure malware TIP patterns are present in detect correlation alerting and threat hunting
- Collaborate with security architecture and engineering to implement and optimize malware detection, collection and reverse engineering capabilities
- Previous experience on a team engaged in malware analysis and reverse engineering.
- Technical experience conducting hands-on forensic, memory, disk and event log forensics; both static and dynamic
- Understanding of functional exploits, the creation of custom shellcode, code to bypass typical security measures, and ring 0 programming.
- Past hands-on experience with the utilization, configuration, and implementation of industry-standard malware analysis including but not limited to static and dynamic tools
- Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs)
- Hands-on experience conducting complex analysis of forensic, event and signature data as well as binary, mobile, and executable code leading to the detection of a variety malware families and strains and/or evidence of advanced persistent threats.
- Excellent oral and written communication skills. Ability to communicate and work effectively with other contractors and Government civilians.
- Highly organized with strong troubleshooting and problem-solving skills
- Ability to work independently and as a team member under tight deadlines with changing priorities.
- TS/SCI with CI Poly required for Position or TS/SCI and willingness to get a poly.
- US Citizenship is required due to the nature of the government contracts we support.
- DoD 8570 IAT Level II equivalent certification (with continuing education where applicable) (Security+, CCNA Security, CSA+, GICSP, GSEC, SSCP) or higher
- DoDD 8140/DoD 8570.01M Computing Environment certification
- GIAC Reverse Engineering Malware (GREM) or equivalent [Infosec Institute Certified Reverse Engineering Analyst (CREA)] within 180 days of contract start
- DoD 8570 CND-Analyst/CSSP Analyst equivalent certification (CEH, CFR, CSA+, GCIA, GCIH, GICSP, SCYBER) within 180 days of contract start
- Bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. Additional experience may be considered in lieu of degree.
- A minimum of 8+ years of relevant professional experience.
- 5 years’ experience performing hands-on malware reverse engineering tradecraft in a large, complex enterprise spanning network, endpoints and cloud environments
- Experience implementing and supporting malware analysis workflows operationally integrated to detection, incident response, countermeasure and threat intelligence SOC operations
- Experience performing incident response and post-mortem attack analysis
- Scripting and/or programming certifications and demonstrable hands-on experience
- Programming experience in one or several languages; C+, C#, Python, Perl, Ruby, .NET, PowerShell
Pay Range:Pay Range $97,500.00 - $150,000.00 - $202,500.00
The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Leidos is a Fortune 500® technology, engineering, and science solutions and services leader working to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. The company’s 47,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $14.4 billion for the fiscal year ended December 30, 2022. For more information, visit www.Leidos.com.
Pay and Benefits
Pay and benefits are fundamental to any career decision. That's why we craft compensation packages that reflect the importance of the work we do for our customers. Employment benefits include competitive compensation, Health and Wellness programs, Income Protection, Paid Leave and Retirement. More details are available here.
Securing Your Data
Beware of fake employment opportunities using Leidos’ name. Leidos will never ask you to provide payment-related information during any part of the employment application process (i.e., ask you for money), nor will Leidos ever advance money as part of the hiring process (i.e., send you a check or money order before doing any work). Further, Leidos will only communicate with you through emails that are generated by the Leidos.com automated system – never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp, Telegram, etc. If you received an email purporting to be from Leidos that asks for payment-related information or any other personal information (e.g., about you or your previous employer), and you are concerned about its legitimacy, please make us aware immediately by emailing us at [email protected].
If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.
Commitment to Diversity
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. Leidos will also consider for employment qualified applicants with criminal histories consistent with relevant laws.