1+ months

Principal / Sr Principal Malware Reverse Engineer

Northrop Grumman
Annapolis Junction, MD 20701
At the heart of Defining Possible is our commitment to missions. In rapidly changing global security environments, Northrop Grumman brings informed insights and software-secure technology to enable strategic planning. We're looking for innovators who can help us keep building on our wide portfolio of secure, affordable, integrated, and multi-domain systems and technologies that fuel those missions. By joining in our shared mission, we'll support yours of expanding your personal network and developing skills, whether you are new to the field or an industry thought-leader. At Northrop Grumman, you'll have the resources, support, and team to do some of the best work of your career.

Northrop Grumman Mission Systems is seeking Malware Reverse Engineers to support DCO/OCO analysts with complex analysis of forensic, event and signature data as well as binary, mobile, executable code leading to the detection of a variety of threat types including malware and potentially advanced persistent threats. The Malware Reverse Engineer will document the analysis techniques in a triage database to assist others in timely kill chain analysis. The Malware Reverse Engineer will capture and perform initial analysis on captured volatile data, log data, captured network traffic data, to identify any immediate intrusion related artifacts which in turn will allow immediate defensive countermeasures to be implemented. The Malware Reverse Engineer will independently develop necessary procedures or scripts to identify such data. The Malware Reverse Engineer will serve as the subject matter expert (SME) on malware detection, analysis and mitigation. The Malware Reverse Engineer will use both static and dynamic tools/techniques to analyze and reverse-engineer malware, and the Sr Principal level will provide instruction and guidance to junior personnel. This position is located in Annapolis Junction, MD.

The position may be filled at a higher level based on the qualifications below.

NGCIMSMD
CIMS

**Qualifications:**

The position may be filled at a Principal Malware Reverse Engineer (Level 3) or a Sr Principal Malware Reverse Engineer (Level 4)

**Minimum Requirements:**

**Education Requirements:** A Bachelor's Degree in computer science, computer engineering, or information systems or related STEM discipline may be substituted for four (4) years of experience, or a Master of Science degree in computer science, computer engineering, or information systems or related discipline may be substituted for six (6) years' experience.

**Security Requirements:** Active TS/SCI w/Polygraph Clearance is required.

**Basic Experience Qualifications for a Level 3:**

Minimum of five (5) years of professional experience in the subject area.
Ability to develop code that takes advantages of a weakness in an operating system, application or any other software code, including application plug-ins. Familiar with disassembly tools and able to develop functional exploits; Create custom shellcode; develop code that can bypass typically security measures; experience with ring 0 programming.
The ability to understand and create code in C, and Python or JavaScript.
Demonstrated experience and/or training in using both static and dynamic tools/techniques to analyze and reverse-engineer malware, to include: Binary Ninja, Immunity Debugger, Ollydbg, Windbg, Ida Pro, and/or Ghidra.

**Basic Experience Qualifications for a Level 4:**
Minimum of Nine (9) years of professional experience in the subject area.
Ability to develop code that takes advantages of a weakness in an operating system, application or any other software code, including application plug-ins. Familiar with disassembly tools and able to develop functional exploits; Create custom shellcode; develop code that can bypass typically security measures; experience with ring 0 programming.
The ability to understand and create code in C, and Python or JavaScript.
Demonstrated experience and/or training in using both static and dynamic tools/techniques to analyze and reverse-engineer malware, to include: Binary Ninja, Immunity Debugger, Ollydbg, Windbg, Ida Pro, and/or Ghidra.

**Preferred Qualifications:**
Experience with USCYBERCOM
IAT Category, Level II (Security+, etc...)

Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA and Pay Transparency statement, please visit www.northropgrumman.com/EEO. U.S. Citizenship is required for most positions.

**Job Category** : Information Technology
20026545

Categories

Posted: 2020-09-22 Expires: 2020-11-12

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Principal / Sr Principal Malware Reverse Engineer

Northrop Grumman
Annapolis Junction, MD 20701

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast