{"id":1144,"date":"2023-11-02T21:03:20","date_gmt":"2023-11-03T02:03:20","guid":{"rendered":"https:\/\/redbluesecurity.com\/?post_type=awsm_job_openings&#038;p=1144"},"modified":"2024-02-09T10:04:58","modified_gmt":"2024-02-09T16:04:58","slug":"malware-researcher","status":"publish","type":"awsm_job_openings","link":"https:\/\/redbluesecurity.com\/?awsm_job_openings=malware-researcher","title":{"rendered":"Malware Researcher"},"content":{"rendered":"\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-vivid-cyan-blue-color has-alpha-channel-opacity has-vivid-cyan-blue-background-color has-background is-style-wide\" id=\"block-e24fe66f-2463-45d1-bd91-e2ef97a2291f\" \/>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\" id=\"block-3b9739cf-5355-4af5-84ec-3a258d65e296\"><strong>Description<\/strong><\/h2>\n\n\n\n<p id=\"block-1ff0500b-948f-45e4-b844-9254cd63900b\">RedBlue Security is seeking a seasoned Malware Researcher to join our client&#8217;s cybersecurity team. This critical role is focused on reverse engineering discoveries and engineering based on those discoveries. The ideal candidate will possess a blend of technical expertise in malware reverse engineering, and a deep understanding of tooling development.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\" id=\"block-dbf994f2-7f40-49dc-8cca-767b0795319e\"><strong>Responsibilities<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>TS\/SCI&nbsp;+ CI Poly<\/li>\n\n\n\n<li>At least 5 years\u2019 experience in malware reverse engineering, with a concentration on sophisticated threats and complex malware.<\/li>\n\n\n\n<li>Proficient in reverse engineering tools such as IDA Pro, Ghidra, OllyDbg, x64dbg.<\/li>\n\n\n\n<li>Skilled in programming in C, C++, Python, and assembly language.<\/li>\n\n\n\n<li>In-depth knowledge of operating systems, network protocols, and software exploitation.<\/li>\n\n\n\n<li>Acquainted with threat intelligence frameworks like MITRE ATT&amp;CK and Cyber Kill Chain.<\/li>\n\n\n\n<li>Excellent communication skills, capable of articulating complex information succinctly.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\" id=\"block-dbf994f2-7f40-49dc-8cca-767b0795319e\"><strong>Requirements<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\" id=\"block-49d5491f-7f87-4424-8edf-5f2c9a319065\">\n<li>Execute detailed reverse engineering of malware, comprehending sample behavior, functionality, and intent.<\/li>\n\n\n\n<li>Employ a variety of methodologies such as static and dynamic analysis, debugging, and disassembly to deconstruct complex malware.<\/li>\n\n\n\n<li>Craft custom scripts and tools to enhance the efficiency of the reverse engineering workflow.<\/li>\n\n\n\n<li>Decode tactics and techniques employed by sophisticated cyber adversaries, including zero-day exploits and APTs.<\/li>\n\n\n\n<li>Engineering &amp; Developing Tools<\/li>\n\n\n\n<li>Keep abreast of emergent malware threats, industry developments, and communicate pertinent updates to the SOC team.<\/li>\n\n\n\n<li>Aid in the advancement of the organization\u2019s threat intelligence by generating comprehensive analytical reports.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:10px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color\" id=\"block-7942b9a8-8686-44bd-a321-d6940f2db5fe\"><strong>The Ideal Candidate<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\" id=\"block-28077c65-473c-4956-85f6-0b6dddf36f01\">\n<li>Experience in applying Tools, Techniques, and Procedures (TTPs) within the context of the MITRE ATT&amp;CK framework.<\/li>\n\n\n\n<li>Competence in conveying technical concepts to both technical and non-technical stakeholders.<\/li>\n\n\n\n<li>Proven track record in training and mentoring teams, raising awareness of current and emerging cyber threats.<\/li>\n\n\n\n<li>Exceptional interpersonal skills, fostering teamwork and collaboration.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Application Process:<\/strong> Interested candidates should submit their resume to apply@redbluesecurity.com, or on our website.  Please include any relevant certifications, published papers, or contributions to the cyber security community.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Description RedBlue Security is seeking a seasoned Malware Researcher to join our client&#8217;s cybersecurity team. This critical role is focused on reverse engineering discoveries and engineering based on those discoveries. The ideal candidate will possess a blend of technical expertise in malware reverse engineering, and a deep understanding of tooling development. Responsibilities Requirements The Ideal [&hellip;]<\/p>\n","protected":false},"author":1,"template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"class_list":["post-1144","awsm_job_openings","type-awsm_job_openings","status-publish","hentry","job-type-full-time","job-location-maryland","job-location-virginia","clearance-ts-sci-ci-poly","salary-200000-250000"],"_links":{"self":[{"href":"https:\/\/redbluesecurity.com\/index.php?rest_route=\/wp\/v2\/awsm_job_openings\/1144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redbluesecurity.com\/index.php?rest_route=\/wp\/v2\/awsm_job_openings"}],"about":[{"href":"https:\/\/redbluesecurity.com\/index.php?rest_route=\/wp\/v2\/types\/awsm_job_openings"}],"author":[{"embeddable":true,"href":"https:\/\/redbluesecurity.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"wp:attachment":[{"href":"https:\/\/redbluesecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}