Description
Actively investigate and develop new software tools and techniques to perform automated malware analysis, digital forensics and cyber intelligence. Applicant should have strong algorithm, software design, and software development skills with an understanding of low level OS and system operations.
Technical Requirements
- Must have strong working knowledge of PHP, JavaScript, Angular, C#, CSS and HTML
- Must have experience in SQL
- Must have rudimentary knowledge in Network Architecture and networked programs
- Must have experience in secure programming for web application development
- Must have experience with the software development life-cycle to include requirements definition and unit testing
- Must have basic level of familiarity with Unix/Linux command-line interface
Other Requirements
- Must be a U.S. Citizen (No Exceptions) with Secret Clearance
- Must have a Bachelor or Master's degree in Computer Science or Electrical/Computer Engineering
- Minimum graduating GPA 3.25
- Must be able to quickly adapt to new situations and problems
- Must be able to operate in a mission-critical and time-sensitive environments
- Must be able to work successfully and effectively within group environments and functional teams
- Must have familiarity with maintainable software processes including software documentation, source code versioning, and unit testing
Education Requirements
Entry Level:
- Bachelor's Degree, no experience necessary
Mid Level:
- Bachelor's Degree plus minimum 5 years experience OR
- Master's Degree plus minimum 3 years experience
Senior Level:
- Bachelor's Degree plus minimum 10 years experience OR
- Master's Degree plus minimum 8 years experience
Desirable:
- Experience in Java, C, C++, Python
- Rudimentary understanding of protocol analysis
- Rudimentary understanding of malware analysis or reverse engineering
- Experience in digital forensics
What your day might entail:
Malware reverse engineers spend their days reversing advanced nation-state level malware, identifying “Indicators”, and writing reports. However, pools of indicators and buckets of reports do no good on their own, which is why our customers have teams of cyber intel analysts who distill bigger picture conclusions which are then reported up the intelligence chain. These analysts also craft targeted roll-up indicator reports that are distributed back to the defense contractor base so that everyone, as a collective, can up their net defenses. All of the reverse engineering reports and technical indicators are stored in a set of massive databases.
Web devs provide analysts with a meaningful way to make use of all of that data. Through custom developed web apps, a cyber intel analyst can sort through the noise to find critical connections. The web app might provide a suite of customized visualizations (interactive graphs), allow the analyst to generate partially-populated reports (on predefined templates), or catalog their analysis, enabling future correlation. Accordingly, these web apps are literally at the heart of nearly all critical intelligence reporting.
by via developer jobs - Stack Overflow
No comments:
Post a Comment