Malware Reverse Engr, Expert Level - 31867 in San Antonio, TX at Alion Science and Technology

Date Posted: 1/6/2020

Job Snapshot

  • Employee Type:
    Full-Time
  • Job Type:
  • Experience:
    Not Specified
  • Date Posted:
    1/6/2020
  • Job ID:
    31867

Job Description

With more than 80 years of experience engineering science and technology solutions to support national security, Alion supports clients with big ideas and real solutions.

(U) JOB SUMMARY:   The Malware Reverse Engineer – Expert Level will independently support DCO/OCO analysts with complex analysis of forensic, event and signature data as well as binary, mobile, executable code leading to the detection of a variety of threat types including malware and potentially advanced persistent threats. The Malware Reverse Engineer – Expert Level will document the analysis techniques in a triage database to assist others in timely kill chain analysis. The Malware Reverse Engineer – Expert Level will capture and perform initial analysis on captured volatile data, log data, captured network traffic data, to identify any immediate intrusion related artifacts which in turn will allow immediate defensive countermeasures to be implemented. The Malware Reverse Engineer – Expert Level will independently develop necessary procedures or scripts to identify such data. The Malware Reverse Engineer – Expert Level will serve as the subject matter expert (SME) on malware detection, analysis and mitigation. The Malware Reverse Engineer – Expert Level will use both static and dynamic tools/techniques to analyze and reverse-engineer malware, and provide instruction and guidance to junior personnel. 

(U) Professional Experience and Education

  • A Master of Science degree in computer science, computer engineering, or information systems or related STEM discipline with twelve (12) years of demonstrated experience. In lieu of a degree, sixteen (16) years of demonstrated experience is required.
  • Ability to develop code that takes advantages of a weakness in an operating system, application or any other software code, including application plug-ins.  Expert knowledge with disassembly tools and able to develop functional exploits; Create custom shellcode; develop code that can bypass typically security measures; experience with ring 0 programming.  
  • The ability to understand and create code in C, and Python or JavaScript. 
  • Demonstrated experience and/or training in using both static and dynamic tools/techniques to analyze and reverse-engineer malware, to include: Binary Ninja, Immunity Debugger, Ollydbg, Windbg, Ida Pro, and/or Ghidra. 

Security Clearance: Top Secret/Sensitive Comp Info

Next Steps

Next Steps

JOIN OUR TALENT NETWORK

Join the Alion Talent Network today and stay up-to-date on our openings as they continue to become available! As a member of our network, you will receive alerts with new job opportunities that match your interests and have the ability to share job opportunities through social media or email. Join now!

Whether you choose to apply or just leave your information, we look forward to staying connected with you.