
Malware Reverse Engineering, Development and Execution Analyst
Agile Defense
full-time
Posted on:
Location Type: Hybrid
Location: Springfield • Virginia • United States
Visit company websiteExplore more
Tech Stack
About the role
- Analyze and investigate malware, digital artifacts and forensic evidence.
- Develop and apply advanced methodologies to address complex and undefined cyber technical and malware challenges.
- Provide malware development and execution as a part of threat emulations operations as directed for any support required after normal business hours. Be a SME in special malware operations that require focused emulation analysis of a specific system’s architecture and security posture.
- Be an expert in and accountable for utilizing a range of intelligence and other cybersecurity resources for malware development and execution to support the threat emulation operations.
- Provide, maintain and brief the malware development and execution portion of all threat emulation exercises.
- Provide associated final reports and briefs from information sharing and specific (threat emulation) actions taken to mitigation execution.
- Support the completion of all required documentation prior to each Threat Emulation operation.
- Support all required activities upon completion of each Threat Emulation operation.
- Provides support, documentation to and other threat emulation duties required.
- Perform forensic examinations on systems, applications and networks to identify indicators of compromise.
- Document technical findings and provide detailed reports to stakeholders.
- Recommend improvements to processes and procedures based on forensic analysis.
- Collaborate with peers and cross-functional teams to resolve multi-disciplinary technical problems including the use of AI for malware creation and attack.
- Apply creativity and technical expertise to develop new solutions and approaches.
- Expert-level knowledge of malware analysis and digital forensics principles.
- Ability to identify, interpret and report on digital evidence from diverse sources including AI systems.
- Strong understanding of complex cyber and AI system behaviors and potential attack vectors.
- Experience in conceptualizing and applying advanced technical theories and methodologies.
- Strong analytical, problem-solving and communication skills.
- Avoids major risks that aren’t part of the core, cybersecurity mission.
- Coding (your language of choice) of malware and unique ad hoc solutions to complex cyber defenses as they arise. Coding is required (not simply AI creation of malware).
Requirements
- Bachelor’s degree or 3+ additional years of relevant cyber experience in lieu of degree. Degree not required.
- 10+ years of relevant malware experience.
- Expert in malware coding (your language of choice) and unique ad hoc creation of red team operations plans.
- Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
- Applicants must hold and maintain an active Top Secret Clearance.
Benefits
- Competitive and comprehensive benefits package
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
malware analysisdigital forensicsmalware codingthreat emulationforensic examinationstechnical reportingAI for malware creationadvanced methodologiescomplex cyber theoriesproblem-solving
Soft Skills
analytical skillscommunication skillscritical thinkingcreativitycollaborationaccountabilityattention to detailrisk managementtranslating requirementsinterpersonal skills
Certifications
Top Secret Clearance