
Vice President, Senior Malware Reverse Engineer, Global Information Security, Australia
- Sydney, NSW
- Permanent
- Full-time
- Working with Malware Defense control owners to evolve malware control strategy and capabilities.
- Mentioning and training other analysts, helping them to improve their malware analysis and reverse engineering skillsets.
- In-depth analysis of malware, including authoring analysis reports.
- Tracking malware campaigns, malicious actors, and related infrastructure.
- Creation of tools and scripts to assist in the analysis of malware analysis.
- Strong direct experience of analyzing malware.
- Intermediate to advanced malware analysis skills.
- Intermediate to advanced experience reverse engineering tools such as IDA Pro, x64dgb, OllyDbg, Immunity Debugger and/or Ghidra.
- Intermediate to advanced experience analyzing dissembled x86 and x64 code. Experience analyzing dissembled code for other architectures (ARM, MIPS, etc.) is a plus.
- Intermediate to advanced experience reverse engineering malware code written in C, C++, VisualBasic, Java, .NET, Delphi, JavaScript, and VBScript.
- Solid background in C++ programming and Win32 API’s.
- Experience creating malware analysis tools and scripts for use in tasks such accelerating malware analysis, unpacking malware, and extracting data (ex – configuration extraction).
- Experience building and maintain scripts to emulate malware and parse c2 response traffic is a plus.
- Experience in encryption/obfuscation and how to reverse it is desired.
- Can create innovative ways to track progression of malware families, infrastructure and campaigns conducted by ecrime, and cyber espionage actors.
- Experience with penetration testing and/or adversary emulation is a plus.
- Background in network traffic analysis.
- Knowledge of networking protocols: TCP/IP, HTTP/HTTPs, FTP, IRC etc.
- GCIH, GREM, GCFA or CISSP is desired, but not required.
- Able to work independently on tasks, but also work well within a team environment.