Northrop Grumman Staff Malware Reverse Engineer in Annapolis Junction, Maryland
At the heart of Defining Possible is our commitment to missions. In rapidly changing global security environments, Northrop Grumman brings informed insights and software-secure technology to enable strategic planning. We're looking for innovators who can help us keep building on our wide portfolio of secure, affordable, integrated, and multi-domain systems and technologies that fuel those missions. By joining in our shared mission, we'll support yours of expanding your personal network and developing skills, whether you are new to the field or an industry thought-leader. At Northrop Grumman, you'll have the resources, support, and team to do some of the best work of your career.
Northrop Grumman Mission Systems is seeking a Staff Level Malware Reverse Engineer to independently support DCO/OCO analysts with complex analysis of forensic, event and signature data as well as binary, mobile, executable code leading to the detection of a variety of threat types including malware and potentially advanced persistent threats. The Malware Reverse Engineer will document the analysis techniques in a triage database to assist others in timely kill chain analysis. The Malware Reverse Engineer will capture and perform initial analysis on captured volatile data, log data, captured network traffic data, to identify any immediate intrusion related artifacts which in turn will allow immediate defensive countermeasures to be implemented. The Malware Reverse Engineer will independently develop necessary procedures or scripts to identify such data. The Malware Reverse Engineer will serve as the subject matter expert (SME) on malware detection, analysis and mitigation. The Malware Reverse Engineer will use both static and dynamic tools/techniques to analyze and reverse-engineer malware, and provide instruction and guidance to junior personnel. This position is located in Annapolis Junction, MD.
Job Category : Information Technology