Malware Analyst / Reverse Engineer

Company Name:
General Dynamics Advanced Information Systems
General Dynamics Advanced Information Systems is a provider of end-to-end Intelligence, Surveillance and Reconnaissance (ISR) solutions to help ensure our customers have the right information when they need it to act with confidence in their high stakes missions. As a business unit within General Dynamics' Information Systems and Technology group, we are dedicated to solving our customer''s tough problems and providing the expertise and technical innovation required to transform data into actionable intelligence.
From undersea sensors to border surveillance systems to space electronics, General Dynamics Advanced Information Systems designs and develops high-performance solutions to gather and organize data from across the cyber, space, air, land and sea domains. This is your opportunity to join a company with more than 50 years proven experience helping our customers be mission ready.
General Dynamics is an Equal Opportunity/Affirmative Action Employer that is committed to hiring a diverse and talented workforce.
Malware Analyst / Reverse Engineer
General Dynamics Advanced Information Systems (GDAIS) has an immediate opening for a mid-level Malware Analyst / Reverse Engineer to support a Government contract in Linthicum, MD. The Malware Analyst/Reverse Engineer must be able to operate both in a team setting as well as independently. The selected candidate will conduct forensic examinations in accordance with established guidelines and procedures.
The position provides an opportunity to develop the cutting-edge technology that supports some of our nation's fundamental defense services. GDAIS employees work closely with esteemed clients to develop solutions that allow them to carry out high-stakes national security missions. The selected candidate will perform forensic analysis of digital information for GDAIS. In addition to receiving a competitive salary and generous health and personal benefits, the Malware Analyst/Reverse Engineer will enhance their skill set by working among a talented and technically accomplished group of colleagues. The employee will also enjoy a flexible work environment where contributions are recognized and rewarded.
Key Responsibilities
Malware Analyst / Reverse Engineer
Performs dynamic analysis of malware using debuggers and system tools to determine entrenchment, file system activity, and network activity. Performs static analysis of malware using IDA Pro to determine functionality. Identifies process/thread/kernel manipulation in malicious code and interacts with running programs to perform analysis. Reports on malware analysis and general artifact discovery for dissemination
Candidates should demonstrate sophisticated problem solving skills, as well as an ability to design, develop and implement innovative GDAIS business solutions. Malware Analyst / Reverse Engineer must have a bachelor's degree in a related specialty or the equivalent, and five to eight years of related experience. Applicants with a master's degree and three to five years of professional experience also qualify.
Experience with programming languages: Assembly language (x86) or C/C++.
Experience in software reverse engineering or software development.
In-depth knowledge of IDA Pro/Debuggers.
In-depth knowledge of dynamic/static malware analysis.
In-depth knowledge of Windows Operating System Internals (Kernel, Registry, File system, Windows APIs)
Department of Defense Basic Digital Forensic Examiner certification or eligibility to take and pass the exam with 1 year from the date of hire
Department of Defense Top Secret clearance with SCI eligibility at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.
Computer Forensics analysis experience (Encase/FTK/X-Ways)
Familiarization with VMWare Workstation, Wireshark, SysInternals tools, Visual Studio 2010
Familiarization with X64/ARM architecture
Familiarization with
Familiarization with Linux Operating System
Experience with WinDbg
Experience with memory dumps
Experience with network capture analysis
Date: 2014-05-14
Country: US
State: MD
City: Linthicum
Postal Code: 21090
Category: Cyber

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.