Software Engineer Malware Analyst

  • Location
    Near Raleigh, North Carolina
  • Job Type:
    Direct Hire
  • Job reference:

Our client about one hour from Raleigh, NC seeking a highly-talented Software Engineer to serve as a Subject Matter Expert (SME) for threat detection and malware/exploitation technologies. The position supports Research and Development (R&D) and Test and Evaluation (T&E) efforts for a fast-paced, mission-critical DoD program. The Software Engineer will be working as part of a multi-disciplinary group and will collaborate across research teams to leverage existing/emerging malware technologies and develop new technologies to support the organization’s mission objectives. 

Software Engineer Malware Analyst Duties:

  • Analyze and/or reverse engineer the behavior of malware using static and dynamic tools and techniques to identify means of modifying, exploiting, and disrupting networks and associated systems and devices
  • Provide subject matter expertise in the detection, analysis, and mitigation of malware; trends in malware development and capabilities; and proficiency with malware analysis
  • Identify requirements for new malware analysis capabilities; and contribute to the development of new malware analysis tools and techniques
  • Produce reports detailing attributes and functionality of malware, including indicators that can be used for malware identification/detection; the relationship between a given sample of malware and other known samples/families of malware; and notable features that indicate the origin or sophistication of the malware and its authors
  • Communicate and collaborate with technical staff
  • Software Engineer Malware Analyst Security Clearance Requirements:

  • Must be US citizen and able to obtain a clearance; TS preferred (Position will ultimately require a TS-SCI)
  • Software Engineer Malware Analyst Qualifications:

  • Bachelor’s degree in Computer Engineering, Computer Science, Networking, Computer Forensics, or similar.
  • 7+ years of relevant work experience
  • Familiarity with operating system concepts, high- and low-level programming, and fundamentals of networking
  • Experience in reverse engineering
  • Demonstrated knowledge in dynamic and static analysis and in such tools as IDA Pro, Binary Ninja, and/or Ghidra
  • Familiarity disassembling/disassemblers and analyzing disassembly of x86 and x64 binaries
  • Possess basic programming and scripting skills (e.g., Java, Python, or Perl)
  • One of the following certifications:
  • GREM – GIAC Reverse Engineering Malware
  • CREA – Certified Reverse Engineering Analyst
  • GXPN – GIAC Exploit Researcher and Advanced Penetration Tester
  • GPEN – GIAC Certified Penetration Tester

    Equal Opportunity Employer/Veterans/Disabled

    To read our Candidate Privacy Information Statement, which explains how we will use your information, please

    The Company will consider qualified applicants with arrest and conviction records