Employ engineering techniques and processes to analyze software to identify vulnerabilities.
Re-create programs to rebuild something similar to it, exploits its weaknesses, or strengthens its defenses.
Develop design specifications by inspection and analysis to offset various malware and to protect and defend government infrastructure.
Develop, research, and maintain proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption.
Conduct vulnerability assessments/penetration tests of information systems.
Ensure software standards are met; designs, develops, documents, tests, and debugs applications software and systems that contain logical and mathematical solutions.
Perform in-depth detailed research of software and methodologies to build defensive and offensive technical capabilities.
Participate in formal technical briefing and proposals.
Perform system analysis, reverse engineering, and static, dynamic, and best-practice malware analytical methodologies on Windows, Android, or UNIX-based platforms.
Provide in-depth understanding of security concepts, protocols, processes, architectures, and tools (authentication and access control technologies, intrusion detection, network traffic analysis, incident handling, media/malware analysis, etc.), malware and programming skills to include C/C++ and Assembly language, and detailed understanding of how network-based attacks work at the operating system and/or protocol level.
Minimum five years of experience as a Malware Analyst.
Minimum of Bachelor’s Degree from an accredited college or university in Computer Engineering, Computer Science, Cybersecurity, Computer Engineering, or related discipline.
A minimum of DOD 8140/DOD 8570 IAM Level I Certification.
Strong attention to detail and organizational skills.