eTeam
Network Architect - III
eTeam, Harrisburg, Pennsylvania, us, 17124
Title: Malware Reverse EngineerLocation: RemoteDuration: 6 - 12+ Months
The clients Security Consulting Services team requires a malware analyst to support a growing caseload in our security consulting business. The analyst will be responsible for examining malicious code to understand the nature of its threat in the context of digital forensics investigations. This sometimes involves reverse-engineering a compiled executable and examining how it interacts with its environment. The analyst will work with other team members to document capabilities of executables, understand how they maintain persistence and propagation, and define signatures for detecting its presence. While the analyst's work will be technical in nature, the analyst must be proficient in simplifying technical concepts in order to advise colleagues and customers on the best course of action.
As a malware analyst on clients Threat Research Advisory Center (VTRAC) Labs team, you will balance the demands of supporting network forensic field consultants, performing malicious code analysis, reverse engineering, and managing evidence from forensic and other security-related engagements. You will be responsible for integrity in analysis, quality in client deliverables, and potentially the security of evidence and lab systems.
Proficiency with scripting languages, developing code, and maintaining a lab environment is essential.
You Must Have:Associate's or Bachelor's Degree in Computer Science, Cybersecurity, or other technical fieldExperience with scripting (e.g., python, perl) and programming (e.g., Java, C, C++)The ability to work outside of normal working hours (evenings and weekends) if neededMalcode analysis skillsExperience with reverse engineering applications (particularly malicious code)Experience with Ghidra or IDA
Even Better if You Also Have:GIAC Reverse Engineering Malware Certification (GREM)Experience developing software applicationsNetwork forensic analysis experience (e.g. PCAPS, logs)Experience with system administration or other tasksNetwork configuration, optimization, and troubleshooting skillsExperience with Linux, Windows, and macOS operating systemsExperience with Amazon Web ServicesAn understanding of information security, network architecture, database concepts, and virtualization solutionsThe ability to work well under pressure while maintaining confidentiality and a professional imageThe ability to communicate effectively verbally and in writingThe ability to work as part of a team, and to absorb knowledge on the fly
This position will have the expectation to work some weekends and after hours.
The clients Security Consulting Services team requires a malware analyst to support a growing caseload in our security consulting business. The analyst will be responsible for examining malicious code to understand the nature of its threat in the context of digital forensics investigations. This sometimes involves reverse-engineering a compiled executable and examining how it interacts with its environment. The analyst will work with other team members to document capabilities of executables, understand how they maintain persistence and propagation, and define signatures for detecting its presence. While the analyst's work will be technical in nature, the analyst must be proficient in simplifying technical concepts in order to advise colleagues and customers on the best course of action.
As a malware analyst on clients Threat Research Advisory Center (VTRAC) Labs team, you will balance the demands of supporting network forensic field consultants, performing malicious code analysis, reverse engineering, and managing evidence from forensic and other security-related engagements. You will be responsible for integrity in analysis, quality in client deliverables, and potentially the security of evidence and lab systems.
Proficiency with scripting languages, developing code, and maintaining a lab environment is essential.
You Must Have:Associate's or Bachelor's Degree in Computer Science, Cybersecurity, or other technical fieldExperience with scripting (e.g., python, perl) and programming (e.g., Java, C, C++)The ability to work outside of normal working hours (evenings and weekends) if neededMalcode analysis skillsExperience with reverse engineering applications (particularly malicious code)Experience with Ghidra or IDA
Even Better if You Also Have:GIAC Reverse Engineering Malware Certification (GREM)Experience developing software applicationsNetwork forensic analysis experience (e.g. PCAPS, logs)Experience with system administration or other tasksNetwork configuration, optimization, and troubleshooting skillsExperience with Linux, Windows, and macOS operating systemsExperience with Amazon Web ServicesAn understanding of information security, network architecture, database concepts, and virtualization solutionsThe ability to work well under pressure while maintaining confidentiality and a professional imageThe ability to communicate effectively verbally and in writingThe ability to work as part of a team, and to absorb knowledge on the fly
This position will have the expectation to work some weekends and after hours.