Malware Specialist
Stroz Friedberg - Washington, DC

This job posting is no longer available on Stroz Friedberg. Find similar jobs: Malware Specialist jobs - Stroz Friedberg jobs

Position Overview

Provide malware analysis in support of incident response engagements. Responsible for performing tasks assigned by Director of Incident Response and Engagement Management. Perform daily tasks associated with developing and maintaining a malware analysis laboratory, secure malware repository and central malware detection datastore.

Essential Job Functions

Establish and maintain a malware analysis laboratory

Recommend hardware, software, and develop policies and procedures to analyze malware

Assist in the development and delivery of malware security awareness communications

Participate in technical meetings and working groups to address issues related to malware security and vulnerabilities

Collaborate with forensic personnel to facilitate an effective malware program

Prepare, write, and present reports and briefings, as required

Thoroughly investigate instances of malicious code to determine attack vector and payload

Conduct reverse-engineering for known and suspected malware files

Develop high performance, false positive free, signature based malware detection schemes

Participates in special forensic projects as required, including collection, preservation of electronic evidence

Investigate network intrusions to determine the cause and extent of the breach

Preserve and analyze data from electronic data sources, including laptop and desktop computers, servers, and mobile devices

Preserve, harvest, and process electronic data according to the firm’s policies and practices

Required Skills

Requirements

3-5 years experience with reverse engineering software binaries

Strong verbal and written communication skills

Proficiency with forensic techniques and the most commonly used forensic toolsets, such as dtSearch, EnCase, and FTK Suite

Strong work ethic and motivation with a demonstrated history of ability to work well in a team under minimal supervision

Demonstrated ability in establishing a malware analysis laboratory

Experienced with reverse engineering tools such as IDA Pro, OllyDbg, and other similar toolsets

Documented ability to reverse engineer undocumented binary software

Strong shell, C, C++ and/or Java programming skills

In-depth understanding of operating system kernels, advanced protection mechanisms, device drivers, and/or compilers

Proficiency in assembler languages

Proficiency with MS Office Applications

Must be able to work collaboratively across agencies and physical locations

Familiarity with Windows, Macintosh, and Linux operating systems

Familiarity with computer system hardware and software installation and troubleshooting

Creative problem solving abilities

Ability to anticipate and respond to changing priorities, and operate effectively in a dynamic demand-based environment, requiring extreme flexibility and responsiveness to client matters and needs

Well-developed analytic, qualitative, and quantitative reasoning skills

Education & Work Experience Required

BS Computer Science, Computer Engineering, Computer Information Systems, OR Computer Systems Engineering. Must have a minimum of 8 years experience or equivalent education and experience.

Required Experience

Stroz Friedberg - 23 months ago - save job - block
About this company
8 reviews
We are a global leader in investigations, intelligence and risk management. To help our clients manage risks, we have assembled a collection...