Network Architect - III - eTeam Inc.
Harrisburg, PA 17101
About the Job
Title: Malware Reverse Engineer
Location: Remote
Duration: 6 - 12+ Months
The clients Security Consulting Services team requires a malware analyst to support a growing caseload in our security consulting business. The analyst will be responsible for examining malicious code to understand the nature of its threat in the context of digital forensics investigations. This sometimes involves reverse-engineering a compiled executable and examining how it interacts with its environment. The analyst will work with other team members to document capabilities of executables, understand how they maintain persistence and propagation, and define signatures for detecting its presence. While the analyst s work will be technical in nature, the analyst must be proficient in simplifying technical concepts in order to advise colleagues and customers on the best course of action.
As a malware analyst on clients Threat Research Advisory Center (VTRAC) Labs team, you will balance the demands of supporting network forensic field consultants, performing malicious code analysis, reverse engineering, and managing evidence from forensic and other security-related engagements. You will be responsible for integrity in analysis, quality in client deliverables, and potentially the security of evidence and lab systems.
Proficiency with scripting languages, developing code, and maintaining a lab environment is essential.
You Must Have:
Associate s or Bachelor s Degree in Computer Science, Cybersecurity, or other technical field
Experience with scripting (e.g., python, perl) and programming (e.g., Java, C, C++)
The ability to work outside of normal working hours (evenings and weekends) if needed
Malcode analysis skills
Experience with reverse engineering applications (particularly malicious code)
Experience with Ghidra or IDA
Even Better if You Also Have:
GIAC Reverse Engineering Malware Certification (GREM)
Experience developing software applications
Network forensic analysis experience (e.g. PCAPS, logs)
Experience with system administration or other tasks
Network configuration, optimization, and troubleshooting skills
Experience with Linux, Windows, and macOS operating systems
Experience with Amazon Web Services
An understanding of information security, network architecture, database concepts, and virtualization solutions
The ability to work well under pressure while maintaining confidentiality and a professional image
The ability to communicate effectively verbally and in writing
The ability to work as part of a team, and to absorb knowledge on the fly
This position will have the expectation to work some weekends and after hours.
Location: Remote
Duration: 6 - 12+ Months
The clients Security Consulting Services team requires a malware analyst to support a growing caseload in our security consulting business. The analyst will be responsible for examining malicious code to understand the nature of its threat in the context of digital forensics investigations. This sometimes involves reverse-engineering a compiled executable and examining how it interacts with its environment. The analyst will work with other team members to document capabilities of executables, understand how they maintain persistence and propagation, and define signatures for detecting its presence. While the analyst s work will be technical in nature, the analyst must be proficient in simplifying technical concepts in order to advise colleagues and customers on the best course of action.
As a malware analyst on clients Threat Research Advisory Center (VTRAC) Labs team, you will balance the demands of supporting network forensic field consultants, performing malicious code analysis, reverse engineering, and managing evidence from forensic and other security-related engagements. You will be responsible for integrity in analysis, quality in client deliverables, and potentially the security of evidence and lab systems.
Proficiency with scripting languages, developing code, and maintaining a lab environment is essential.
You Must Have:
Associate s or Bachelor s Degree in Computer Science, Cybersecurity, or other technical field
Experience with scripting (e.g., python, perl) and programming (e.g., Java, C, C++)
The ability to work outside of normal working hours (evenings and weekends) if needed
Malcode analysis skills
Experience with reverse engineering applications (particularly malicious code)
Experience with Ghidra or IDA
Even Better if You Also Have:
GIAC Reverse Engineering Malware Certification (GREM)
Experience developing software applications
Network forensic analysis experience (e.g. PCAPS, logs)
Experience with system administration or other tasks
Network configuration, optimization, and troubleshooting skills
Experience with Linux, Windows, and macOS operating systems
Experience with Amazon Web Services
An understanding of information security, network architecture, database concepts, and virtualization solutions
The ability to work well under pressure while maintaining confidentiality and a professional image
The ability to communicate effectively verbally and in writing
The ability to work as part of a team, and to absorb knowledge on the fly
This position will have the expectation to work some weekends and after hours.
Source : eTeam Inc.