Agile Defense

Malware Reverse Engineering, Development and Execution Analyst

Agile Defense

full-time

Posted on:

Location Type: Hybrid

Location: SpringfieldVirginiaUnited States

Visit company website

Explore more

AI Apply
Apply

Job Level

Tech Stack

About the role

  • Analyze and investigate malware, digital artifacts and forensic evidence.
  • Develop and apply advanced methodologies to address complex and undefined cyber technical and malware challenges.
  • Provide malware development and execution as a part of threat emulations operations as directed for any support required after normal business hours. Be a SME in special malware operations that require focused emulation analysis of a specific system’s architecture and security posture.
  • Be an expert in and accountable for utilizing a range of intelligence and other cybersecurity resources for malware development and execution to support the threat emulation operations.
  • Provide, maintain and brief the malware development and execution portion of all threat emulation exercises.
  • Provide associated final reports and briefs from information sharing and specific (threat emulation) actions taken to mitigation execution.
  • Support the completion of all required documentation prior to each Threat Emulation operation.
  • Support all required activities upon completion of each Threat Emulation operation.
  • Provides support, documentation to and other threat emulation duties required.
  • Perform forensic examinations on systems, applications and networks to identify indicators of compromise.
  • Document technical findings and provide detailed reports to stakeholders.
  • Recommend improvements to processes and procedures based on forensic analysis.
  • Collaborate with peers and cross-functional teams to resolve multi-disciplinary technical problems including the use of AI for malware creation and attack.
  • Apply creativity and technical expertise to develop new solutions and approaches.
  • Expert-level knowledge of malware analysis and digital forensics principles.
  • Ability to identify, interpret and report on digital evidence from diverse sources including AI systems.
  • Strong understanding of complex cyber and AI system behaviors and potential attack vectors.
  • Experience in conceptualizing and applying advanced technical theories and methodologies.
  • Strong analytical, problem-solving and communication skills.
  • Avoids major risks that aren’t part of the core, cybersecurity mission.
  • Coding (your language of choice) of malware and unique ad hoc solutions to complex cyber defenses as they arise. Coding is required (not simply AI creation of malware).

Requirements

  • Bachelor’s degree or 3+ additional years of relevant cyber experience in lieu of degree. Degree not required.
  • 10+ years of relevant malware experience.
  • Expert in malware coding (your language of choice) and unique ad hoc creation of red team operations plans.
  • Proven ability to analyze complex requirements and translate them into clear, actionable tasks and processes through critical thinking.
  • Applicants must hold and maintain an active Top Secret Clearance.
Benefits
  • Competitive and comprehensive benefits package
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
malware analysisdigital forensicsmalware codingthreat emulationforensic examinationstechnical reportingAI for malware creationadvanced methodologiescomplex cyber theoriesproblem-solving
Soft Skills
analytical skillscommunication skillscritical thinkingcreativitycollaborationaccountabilityattention to detailrisk managementtranslating requirementsinterpersonal skills
Certifications
Top Secret Clearance