The Latest in IT Security

Reverse Engineer

18
Nov
2013

Reverse Engineer

Posted: 13 November 2013
Company name: Lockheed Martin
Location: Hanover, Maryland
United States
Poster represents: employer
Terms of employment: Salaried employee
Hours: full time
Onsite: yes

Description:
Want to work in a major crime lab surrounded by expert cyber security professionals?!? We’re looking for an exceptional malware analyst and reverse engineer with at least 2-5 years of software reverse engineering and software development experience. This person will play a critical role performing dynamic analysis of malware using debuggers and system tools to determine entrenchment, file system activity and network activity. They will perform static analysis of malware using IDA Pro to determine functionality. They will identify process, thread, kernel manipulation in malicious code and interact with running programs to perform analysis. They will report on malware analysis and general artifact discovery for dissemination.

Required skills:
Experience with programming languages: Assembly language (X86) or C, C++. Two to five years of experience in software reverse engineering and/or software development. In-depth knowledge of IDA Pro/Debuggers, dynamic/static malware analysis and windows operating system internals (kernel, registry, file system, windows APIs). Bachelor of Science degree in Computer Science, Computer Engineering or related computer field, or equivalent computer related work experience. Department of Defense Basic Digital Forensic Examiner Certification or eligibility to take and pass the exam within 1 year from the date of hire. In order to be considered a candidate you must have an active Top Secret Clearance with eligibility for SCI.

Desired skills:
Computer forensic experience. Familiarization with VMWare Workstation, Wireshark, SysInternals tools, Visual Studio 2010, X84/ARM architecture, python, .net, Java, WinDbg.

URL for more information:
http://discoverlockheedmartin.com/cybersec/index.asp

Contact information:
For more information, please contact Pete Bugnatto at [email protected]

Or visit the URL below where you can submit information and Pete will respond via your preferred method of contact.

Leave a reply


Categories

SATURDAY, AUGUST 24, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks