Cyber Malware Reverse Engineer 104-025
IC-CAP LLC is a Woman Owned / HUBZone Small Business working in the Department of Defense and Intelligence Community. We are always looking for highly talented, energetic, and dynamic professionals that are interested in protecting the defense of our nation.
Some of the positions are future positions. Please look at the opening line of the job description to determine if this is an open or future position.
Our positions are not remote unless stated in the job description below.
We are looking to fill this position at the following location(s):
- Colorado Springs, CO
Cyber Malware Reverse Engineer:
Job Description Summary:
Designs and evaluates end-to-end systems through their entire life cycle. Ensures products and systems comply with requirements and customer information assurance and cybersecurity standards and practices through formal verification methods with specific emphasis on network operations and cyber warfare tactics.
This position has alternate locations in the National Capital Region.
Investigates, analyzes, and responds to cyber incidents within a network environment or enclave.
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. Interprets, analyzes, and reports all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events.
Evaluates, tests, recommends, coordinates, monitors, and maintains cybersecurity policies, procedures, and systems, including access management for hardware, firmware, and software.
Ensures that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with cybersecurity standards.
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.
Researches and evaluates new concepts and processes to improve performance.
Analyzes cross-functional problem sets, identifies root causes and resolves issues.
Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.
May coach and provide guidance to less-experienced professionals.
May serve as a team or task lead.
Expertise in reverse engineering malware, and familiarity with today's tools and operational needs.
Ability to identify vulnerabilities in software and hardware, analyze and reverse engineer software and hardware systems.
The successful applicant should be expected to identify potential cyber threats, determine levels of risk, and produce analytical reports for a variety of audiences.
You will occasionally be required to present your findings in front of senior executives, so the ability to translate technical indicators into layperson's terms is vital.
Outstanding problem-solving skills are essential. When serious threats are identified, you will work closely with other areas of the security team to identify appropriate solutions. You must be passionate about technology, and able to learn the ropes of new security solutions rapidly.
Recognize common behavior patterns that are primarily found in malware.
Knowledge of debuggers and disassemblers
Familiarity with linkers and loaders
Indicators of Compromise (IOC)s will be obtained through: forensic analysis of digital information,
Open Source Intel (OSINT) review/monitoring, available tools both customer provided and free, and pivoting/researching on previously reported IOCs.
Must have common knowledge of standard network infrastructure.
Other items that would be good to know: domain masquerading, certificates, and file hashing.
Familiar with monitoring emerging threats through Tools, Techniques, and Procedures (TTPs) and how they relate to the MITRE ATT&CK framework
Participate in collaborative sessions with other CNDSPs and IC agencies on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data.
Assist in the development of IOCs for active defensive countermeasures and passive detection signatures.
Good written communications skills are necessary in order to properly document and report the identification and sharing of newly identified IOCs.
Attention to detail and ability to work with team-members and independently.
Education and Experience:
Relevant professional certifications will be considered equivalent to six (6) months of relevant experience.
Training and Certifications:
GIAC Reverse Engineering Malware (GREM) or equivalent.
DoDD 8140/DoD 8570.01M IAT Level III Baseline Certification.
DoDD 8140/DoD 8570.01M CNDSP Analyst (CND-A) Baseline Certification.
TS SCI CI poly