- Palo Alto Networks (Santa Clara, CA)
- …side projects to improve our team workflows and company products. **Your Impact** + Reverse engineer malware via static and dynamic methods + Collaboration with ... Experience** + Proficiency in Python, C, and/or C++ Experience in malware analysis and reverse engineering in x86/x64 + Experience with debuggers such as windbg,… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- …develop software utilities to automate security analysis efforts. Working with senior program/technical staff plans, conducts assignments and review progress, ... review applications during this time. *Responsibilities Include:* * Analyze ( reverse engineer) anomalous/malicious software and hardware firmware/binaries. * Determine… more
- General Dynamics Information Technology (Fort Belvoir, VA)
- …Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM) + Security Clearance Level: TS/SCI ... Description:** Deliver simple solutions to complex problems as a Software Developer, Senior at GDIT. Here, you'll tailor cutting-edge solutions to the unique… more
- Google (Washington, DC)
- Senior Incident Response Consultant, Google Public Sector _corporate_fare_ Google _place_ Reston, VA, USA; Austin, TX, USA; +3 more; +2 more **Mid** Experience ... forensics or administration, threat intelligence analysis, technical IR processes, reverse engineering, enterprise security architecture. + Experience leading Incident… more
- Noblis (Chantilly, VA)
- …in multiple languages with focus on rapid software prototyping + Complex malware analysis, digital forensics, and software reverse engineering + Exploit ... + Research emerging technologies, exploitation techniques, and custom tools + Perform reverse engineering of cyber actor tools and techniques to advance defenses +… more
- Mayo Clinic (Rochester, MN)
- …frameworks, security technologies, and threat landscape. Proficiency in forensic analysis, malware reverse engineering, and network security monitoring tools. ... and regulatory requirements. Coordinates and drive investigations into suspicious activities, malware attacks, and advanced persistent threats (APTs). Serves as the… more