Red Team Malware Reverse Engineer Software Developer - Peraton
Virginia Beach, VA
About the Job
Responsibilities
The Naval Surface Warfare Center Dahlgren Division originally established itself as the major testing area for naval guns and ammunition. Today, it continues to provide the military with the development and integration of warfare systems for the warfighter, warfighting and the future fleet.
- Peraton has an opportunity for an Malware Reverse Engineer Software Developer
- The candidate serves as a top level expert and recognized authority in reverse engineering and malware development.
- Conducts preliminary and advanced design studies and prepares and presents major portions of engineering proposals.
- Conceives and develops solutions to complex analytical, design, and test problems that program(s) experience.
- Contributes to systems philosophy and design objectives of highly complex systems.
- Analyzes and resolves critical failures in test and service without the benefit theoretical studies.
- Assures continuity of design features from advanced design through contract status.
- Writes very complex specifications and engineering reports as a result of advance studies, special engineering investigations, and similar activities.
- Develops aspects of new theory and design criteria for general application.
Specific job responsibilities include:
Development, testing, and sustainment of tools by:
- Analyzing protocols and services vulnerabilities and recommend frameworks to exploit the vulnerabilities
- Developing exploits based on proposed and US Government approved frameworks Testing tools in a representative environment, meeting all defined tool development lifecycle requirements
- Sustaining tools when incorporated into the approved baseline
Exploit development to include:
- Reverse engineering and debugger use
- Malware development
- Exploit development in:
Kernels and (Windows/LINUX)
- Browsers/Webkit Employ Cobalt Strike or other similar C2 Frameworks
- Scripting or developing in one or more of the following: C# (.NET), C, C++, Python, Go, Rust, Assembly
- Use Git or other versioning control software
- Use containerization software (e.g. Docker) and other software virtual environments (e.g. PyEnv)
- Leverage proof of concept code to build or tailor exploits, especially in the use of C2 tools
- Use communication protocols such as DNS, http/s, websockets, or SMB
- Employ EDR detection and evasion techniques
- Provide verbose documentation on the applicability and use of each tool
- 10% travel is required
Qualifications
Basic Requirements:
- BS 12-15, MS 10-13. Phd 10+Bachelot's degree with 12 years of experience. Master's degree with 10 years of experience or PhD with 10+ years of experience
- 8140.01 certification 641 (or similar) at the Intermediate Level
- Demonstrated experience with Reverse Engineering
Demonstrated experience with API Development
Demonstrated experience developing Linux Tools
Demonstrated experience testing software in a testing environment
DevOps Experience: GitLab, GitLab CI, Docker Buildkit, docker-compose, cross-compilation toolchains, build systems
- Active Secret Clearance
Peraton Overview
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.