Vencore Senior Malware Reverse Engineer in Herndon, Virginia

Overview

Vencore is a proven provider of information solutions, engineering and analytics for the U.S. Government. With more than 40 years of experience working in the defense, civilian and intelligence communities, Vencore designs, develops and delivers high impact, mission-critical services and solutions to overcome its customers most complex problems.

Headquartered in Chantilly, Virginia, Vencore employs 3,800 engineers, analysts, IT specialists and other professionals who strive to be the best at everything they do.

Vencore is an AA/EEO Employer - Minorities/Women/Veterans/Disabled

Responsibilities

Join Vencore in support of a future contract to provide network security services for an Intelligence Community customer to protect against outside threats. Work with the incident response and forensics teams to perform malware analysis on digital media. Duties include:

  • Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers.
  • Conduct reverse-engineering for known and suspected malware files. Investigates instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration.
  • Provide detailed reports of any findings. Performs research in the area of malicious software, vulnerabilities, and exploitation tactics. Identify vulnerabilities in binaries, identify and analyze shell-code, and recommend preventative or defensive actions.
  • Reverse-engineer malware and incorporate analysis results into detailed reporting to include behavior, identified infrastructure used for command and control, and mitigation techniques. Develop network and host based signatures to identify specific malware. Recommend heuristic or anomaly based detection methods. Compare malware to existing malware signatures.
Qualifications

Required

  • BS degree in computer engineering, computer science or equivalent. 8 years of experience may be substituted for a degree on a case-by-case basis.
  • Minimum 5 years of progressively responsible experience performing software and malware reverse engineering (3 years), forensics investigations.
  • Strong analytical and problem solving skills
  • Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and Open Source (OllyDbg, Radare, GDB, etc.) tools and methods to perform software and malware reverse engineering investigations.
  • Demonstrated experience writing code (C, C++, Python, etc.) to perform
  • Demonstrated experience in analyzing disassembled code for x86-64 and ARM (32 and 64 bit).
  • Top Secret/SCI w/Poly

Desired

  • Certifications: Certified Reverse Engineering Analyst (CREA), GIAC Reverse Engineering Malware (GREM), or related certification.
  • Experience in hardware reverse engineering
  • Experience with data recovery tools (PC-3000) and techniques
  • Experience performing low-level data extraction (JTAG, chip-off, etc.)

Job ID 2017-49058

# of Openings Remaining 2

Category Information Technology

Residency Status U.S. Citizenship Required

Clearance Top Secret/SCI w/Poly

Employee Type Regular

Time Type Full Time