Chenega Corporation Malware Reverse Engineer III in Fort Meade, Maryland

NJVC

Company Job Title:

Malware Reverse Engineer III

Clearance:

TS/SCI with CI Poly

Location:

Ft. Meade, MD

Reports To:

Senior Project Manager

FLSA Status:

Exempt, Full Time, Regular

Summary:The Malware Reverse Engineer III will employ engineering techniques and processes to analyze software to identify vulnerabilities.

Essential Duties and Responsibilities:(Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions of this position)

  • Re-create and rebuild programs to exploit weaknesses or strengthen defenses.

  • Develop design specifications by inspection and analysis to offset various malware and to protect and defend USCYBERCOM infrastructure.

  • Develop, research, and maintain proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption.

  • Conduct vulnerability assessments/penetration tests of information systems.

  • Ensure software standards are met; design, develop, document, test, and debug applications software and systems that contain logical and mathematical solutions.

  • Perform in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities for USCYBERCOM.

  • Participate in formal technical briefing and proposals.

  • Perform system analysis, reverse engineering, and static, dynamic, and best-practice malware analytical methodologies on Windows, Android, or UNIX-based platforms.

Non-Essential Duties:Other duties as assigned

Supervisory Responsibilities:None

Minimum Qualifications:(To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.)

  • Bachelor’s Degree in Computer Engineering, Computer Science, Cybersecurity, Computer Engineering, or related discipline.

  • 10 years of experience

  • Experience with the following:

  • IDA Pro

  • REMnux

  • EnCase

  • Malware Analysis

  • 80386 Assembly Language Programming

  • Linux Assembly Language Programming

  • Reverse Engineering/Disassembly

  • Intrusion analysis

  • Incident response

  • Forensic analysis of hard drives, systems, and networks

  • Behavioral, dynamic, and static analysis of malware

  • Building and configuring malware analysis labs

  • Threat intelligence analysis

  • A minimum of DOD 8140/DOD 8570 IASAE Level II Certification or CND

  • TS/SCI with CI Poly

Knowledge, Skills and Abilities:

  • Knowledge of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.).

  • Malware and programming skills to include C/C and Assembly language.

  • Detailed understanding of how network-based attacks work at the operating system and/or protocol level.

Diversity:

  • Shows respect and sensitivity for cultural differences; Educates others on the value of diversity; Promotes a harassment-free environment; Builds a diverse workforce.

Ethics:

  • Treats people with respect; Keeps commitments; Inspires the trust of others; Works with integrity and ethically; Upholds organizational values.

Physical Demands:

  • The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

  • While performing the duties of this Job, the employee is regularly required to sit and talk or hear. The employee is frequently required to walk; use hands to finger, handle, or feel and reach with hands and arms. The employee is occasionally required to stand; climb or balance and stoop, kneel, crouch, or crawl. The employee must occasionally lift and/or move up to 25 pounds. Specific vision abilities required by this job include close vision.

Work Environment :

  • The work environment characteristics described here are representative of those an employee encounters while performing the essential functions of this job.

  • The employee will normally work in a temperature-controlled office environment, with frequent exposure to electronic office equipment.

  • During visits to areas of operations, may be exposed to extreme cold or hot weather conditions. Is occasionally exposed to fumes or airborne particles, toxic or caustic chemicals, and loud noise.

Chenega Corporation and family of companies is an EOE.

Equal Opportunity Employer Minorities/Women/Veterans/Disabled/Sexual Orientation/Gender Identity

Native preference under PL 93-638.

We participate in the E-Verify Employment Verification Program.

Minimum Qualifications:(To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.)

  • Bachelor’s Degree in Computer Engineering, Computer Science, Cybersecurity, Computer Engineering, or related discipline.

  • 10 years of experience

  • Experience with the following:

  • IDA Pro

  • REMnux

  • EnCase

  • Malware Analysis

  • 80386 Assembly Language Programming

  • Linux Assembly Language Programming

  • Reverse Engineering/Disassembly

  • Intrusion analysis

  • Incident response

  • Forensic analysis of hard drives, systems, and networks

  • Behavioral, dynamic, and static analysis of malware

  • Building and configuring malware analysis labs

  • Threat intelligence analysis

  • A minimum of DOD 8140/DOD 8570 IASAE Level II Certification or CND

  • TS/SCI with CI Poly

Job: General Engineering

Organization: NJVC

Title: Malware Reverse Engineer III

Location: Maryland-Fort Meade

Requisition ID: 1700001565