Booz Allen Hamilton is seeking a Senior Malware Reverse Engineer to develop offensive cyber operations that are essential to national security. The role involves utilizing vulnerability analysis, network mapping, and exploitation techniques to support critical security missions.
Responsibilities:
- Experience with using industry standard static and dynamic analysis tools, including disassemblers, debuggers, virtual machines, and hex editors
- Experience in a scripting language such as Python or JavaScript
- Experience with development or reverse engineering of Windows API targets
- Experience with the identification and classification of malware families based on standard taxonomy and typical malware attack methodologies for both Windows and Linux
- Knowledge of operating systems, including Windows, Linux, and Mac, application behaviors, and network traffic analysis to identify malware exploits
- Experience with vulnerability research and exploitation methodologies such as fuzzing, shellcode, and leveraging memory corruption vulnerabilities
- Ability to analyze shellcode, packed or obfuscated code, and the associated algorithms, and capture and interpret traces using Wireshark
- Ability to read C/C++, C#, Go, Java, JavaScript, Python, or Rust
- TS/SCI clearance with a polygraph
- Bachelor's degree and 5+ years of experience in malware reverse engineering, or Master's degree and 3+ years of experience in malware reverse engineering
- Ability to read C/C++ and Python preferred
- Master's degree in a related field
- GREM Certification
- OSED or OSEE Certification
Requirements:
- Experience with using industry standard static and dynamic analysis tools, including disassemblers, debuggers, virtual machines, and hex editors
- Experience in a scripting language such as Python or JavaScript
- Experience with development or reverse engineering of Windows API targets
- Experience with the identification and classification of malware families based on standard taxonomy and typical malware attack methodologies for both Windows and Linux
- Knowledge of operating systems, including Windows, Linux, and Mac, application behaviors, and network traffic analysis to identify malware exploits
- Experience with vulnerability research and exploitation methodologies such as fuzzing, shellcode, and leveraging memory corruption vulnerabilities
- Ability to analyze shellcode, packed or obfuscated code, and the associated algorithms, and capture and interpret traces using Wireshark
- Ability to read C/C++, C#, Go, Java, JavaScript, Python, or Rust
- TS/SCI clearance with a polygraph
- Bachelor's degree and 5+ years of experience in malware reverse engineering, or Master's degree and 3+ years of experience in malware reverse engineering
- Ability to read C/C++ and Python preferred
- Master's degree in a related field
- GREM Certification
- OSED or OSEE Certification