The Defense group at Leidos has an exciting opportunity for a Malware Analyst/Reverse Engineer to lead the development of malware analysis and forensic capabilities at the Defense Threat Reduction Agency (DTRA) in Fort Belvoir, VA.
You will be the subject matter expert leading the review and incorporation of devices, applications, policies and procedures working closely with fellow teammates and independently as necessary. You will conduct dynamic and static analysis of malicious code to determine mitigations and compensating controls in support of DTRA's Cybersecurity mission.
- Work with analysts to analyze malware associated with advanced threat actors in order to develop leads and insights into actor infrastructure, tooling, and targeting to generate valuable indicators enhance signature development capabilities.
- Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers.
- Analyze, disassemble, and reverse engineer software binaries; document and transition results in reports, presentations and technical exchanges.
- Develop and maintain malware analysis artifacts, reports, case notes, and all case related data, and ensure information is properly stored.
- Work independently or in project teams; designing, developing, and deploying solutions, delivering projects on time and with minimal direction.
- BA/BS college degree required and eight (8) - twelve (12) years of experience
- Top-Secret Clearance required with ability to obtain SCI
- DoD 8570 compliant certification (minimum Security + CE), along with applicable CNDSP/CSSP certification (CEH or equivalent)
- Demonstrated interpersonal skills (initiative, adaptability, inclusiveness, optimism, curiosity, empathy, respect) which support the development of high functioning teams.
- Demonstrated experience using commercial and open-source malware analysis tools and platforms such as debuggers, disassemblers, decompilers, sandboxes and virtualization solutions.
- Demonstrated ability to coherently present potentially sensitive threat intelligence to a wide variety of audiences and experience levels in public and private settings.
- Experience conducting forensic analysis of networks and systems impacted by small and large APT related intrusions.
- Supporting incident response and familiarity with common incident response procedures, processes, and tools.
- Proficient in more than one programming language (e.g. C/C++, Java, Ruby, Perl, Bash, Python).
- Certified Reverse Engineering Analyst (CREA), GIAC Reverse Engineering Malware (GREM), or related certification.