Logo
Indotronix International Corporation

Malware Reverse Engineer

Indotronix International Corporation, Harrisburg, PA


Title: Malware Reverse Engineer

Location: Harrisburg-PA

Working Model: Fully Remote

Duration: 07/08/2024 to 08/08/2025

Max Bill: $100.00

Positions: 1

Targeted Years of Experience: 5-7 years

Malware Reverse Engineer

The Verizon Security Consulting Services team requires a malware analyst to support a growing caseload in our security consulting business. The analyst will be responsible for examining malicious code to understand the nature of its threat in the context of digital forensics investigations. This sometimes involves reverse-engineering a compiled executable and examining how it interacts with its environment. The analyst will work with other team members to document capabilities of executables, understand how they maintain persistence and propagation, and define signatures for detecting its presence. While the analyst's work will be technical in nature, the analyst must be proficient in simplifying technical concepts in order to advise colleagues and customers on the best course of action.

As a malware analyst on Verizon's Threat Research Advisory Center (VTRAC) Labs team, you will balance the demands of supporting network forensic field consultants, performing malicious code analysis, reverse engineering, and managing evidence from forensic and other security-related engagements. You will be responsible for integrity in analysis, quality in client deliverables, and potentially the security of evidence and lab systems.

Proficiency with scripting languages, developing code, and maintaining a lab environment is essential.

You Must Have:
• Associate's or Bachelor's Degree in Computer Science, Cybersecurity, or other technical field
• Experience with scripting (e.g., python, perl) and programming (e.g., Java, C, C++)
• The ability to work outside of normal working hours (evenings and weekends) if needed
• Malcode analysis skills
• Experience with reverse engineering applications (particularly malicious code)
• Experience with Ghidra or IDA

Even Better if You Also Have:
• GIAC Reverse Engineering Malware Certification (GREM)
• Experience developing software applications
• Network forensic analysis experience (e.g. PCAPS, logs)
• Experience with system administration or other tasks
• Network configuration, optimization, and troubleshooting skills
• Experience with Linux, Windows, and macOS operating systems
• Experience with Amazon Web Services
• An understanding of information security, network architecture, database concepts, and virtualization solutions
• The ability to work well under pressure while maintaining confidentiality and a professional image
• The ability to communicate effectively verbally and in writing
• The ability to work as part of a team, and to absorb knowledge on the fly

This position will have the expectation to work some weekends and after hours.

Conference Call Notes

Jobe Beckhom- Hiring Manager.

Targeted Years of Experience: 5-7 years (less or more is also fine).

Malware Reverse Engineer role.

performing malicious code analysis, reverse engineering (particularly malicious code).

Java, C++, Python - scripting/programming.

Experience with Ghidra or IDA is very helpful.

*Linux experience

*Excellent Communication Skills both written and oral.

GIAC Reverse Engineering Malware Certification (GREM) is preferred.

Three rounds of Video interview.

1-on-1 round, technical round (test) & Panel.

Indotronix is an Equal Opportunity Employer