Sr. Lead Malware Analyst / Reverse Engineer

Company Name:
General Dynamics Advanced Information Systems
General Dynamics Advanced Information Systems is a provider of end-to-end Intelligence, Surveillance and Reconnaissance (ISR) solutions to help ensure our customers have the right information when they need it to act with confidence in their high stakes missions. As a business unit within General Dynamics' Information Systems and Technology group, we are dedicated to solving our customer''s tough problems and providing the expertise and technical innovation required to transform data into actionable intelligence.
From undersea sensors to border surveillance systems to space electronics, General Dynamics Advanced Information Systems designs and develops high-performance solutions to gather and organize data from across the cyber, space, air, land and sea domains. This is your opportunity to join a company with more than 50 years proven experience helping our customers be mission ready.
General Dynamics is an Equal Opportunity/Affirmative Action Employer that is committed to hiring a diverse and talented workforce.
Job Description: Malware Analyst / Reverse Engineer
Performs static analysis of malware using debuggers and decompilers to determine functionality. Identifies process/thread/kernel manipulation in malicious code and interacts with running programs to perform analysis. Identifies method of entrenchment, file system activity and network activity. Develops technical reports on malware analysis and general artifact discovery for dissemination.
Basic Qualifications:
Experience with programming languages: Assembly language (x86) or C/C++.
Experience in software reverse engineering or software development.
In-depth knowledge of static malware analysis.
In-depth knowledge of IDA Pro/Debuggers.
In-depth knowledge of Windows Operating System Internals (Kernel, Registry, File system, Windows APIs)
Strong writing and communication skills.
Department of Defense Basic Digital Forensic Examiner certification or eligibility to take and pass the exam with 1 year from the date of hire
Job Requirements
Candidates should demonstrate sophisticated problem solving skills, as well as an ability to design, develop and implement innovative GDAIS business solutions. Malware Analyst / Reverse Engineers must have a bachelor''s degree in a related specialty or the equivalent and ten years of related experience. Applicant''s with a master''s degree and eight years of professional experience also qualify.
Department of Defense Top Secret security clearance with SCI eligibility is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.
Computer Forensics analysis experience (Encase/FTK/X-Ways)
Familiarization with X64/ARM architecture
Familiarization with
Familiarization with Linux Operating System
Experience with WinDbg
Experience with memory dumps
Experience with network capture analysis
Date: 2014-05-22
Country: US
State: MD
City: Linthicum
Postal Code: 21090

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.