Principal Reverse Engineer ( Malware ) - Remote Southeast US

Principal Reverse Engineer ( Malware ) - Remote Southeast US

27 Feb 2024
District of Columbia, Washington, 20001 Washington USA

Principal Reverse Engineer ( Malware ) - Remote Southeast US

Vacancy expired!

Job Description

Mandiant’s Front Line Applied Research and Expertise (FLARE) team works on our in-depth reverse engineering and malware analysis support to various functions of the Mandiant Solutions business. By utilizing front-line knowledge gained from incident response engagements, malware samples, and globally deployed FireEye products, FLARE is able to find evil and expand wisdom.

If you have strong programming skills, experience in malware analysis or reverse engineering, and are looking for an opportunity to collaborate with an industry-leading team, then this may be the opportunity for you. As a reverse engineer working within FLARE you will dissect attacker tools and backdoors in support of incident responders. You will also help develop innovative tools to aid other business lines and automate malware analysis and reverse engineering efforts.

What You Will Do:

  • Analyze executables and malicious files
  • Collaborate with a team of experienced malware analysts and researchers
  • Develop novel solutions to challenges facing incident responders and malware analysts
  • Support the company’s research and development efforts

Qualifications

Requirements:

  • Strong programming skills
  • Ability to analyze disassembly of x86 and x64 binaries
  • Knowledgeable in the use of:
    • IDA Pro disassembler
    • User- and kernel-mode debuggers
    • Common binary file formats
    • Dynamic analysis tools
    • Network analysis tools
  • Ability to reverse engineer binaries of various types including:
    • C/C
    • Delphi
    • NET
    • Compiled VBScript
  • Understanding of software exploits
  • Experience developing scripts to decode obfuscated data and network communications
  • Experience developing applications in C, C, and .NET
  • Thorough understanding of network protocols
  • Experience mitigating anti-reverse engineering techniques

Additional Qualifications:

  • Ability to analyze shellcode
  • Ability to analyze packed and obfuscated code
  • Capable of Python scripting to automate analysis tasks
  • Capable of identifying host- and network-based indicators

Additional Information

At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.

This is aregionally-based remote role that mustbe located in Northeast/ Southeast/ Southwest/ Midwest Region in the US.

Job Details

Jocancy Online Job Portal by jobSearchi.