Reverse Engineer (offline)
Qualifications:
Technical skills: Bash, Python, Powershell;
Preferred Experience: Perform reverse of malicious samples and ability to clearly explain their behavior;
Level of English: Intermediate+.
Knowledge:
TTP strong understanding;
Cryptography: understanding basic principles, encoding, hashing;
UNIX Operating System concepts;
Yara rules experience;
OS virtualization: VMWare, Virtual machines;
Assembly language knowledge, at least basic;
Working with Sandbox and the ability to analyze their results: e.g: Cuckoo Sandbox, Any.Run, Joe Sandbox, etc;
Experience working with IDS;
Mitre Matrix knowledge.
Tools:
Network: strong knowledge of WireShark, tcpdump, etc;
Experience working with reverse engineering tools (IDA, Ghidra, Hopper, etc.);
Experience with debuggers:gdb, lldb , etc;
Experience working with System Monitoring tools: ProcMon, SysMon (Windows), auditd (Linux), Monitor.app, FortiAppMonitor (Mac OS);
Experience working with OsQuery and analyzing output;
Experience with tracing tools: dtrace, dtruss etc;
Working with VirusTotal, VirusShare, VirusBay in order to find new threats.
Technical skills: Bash, Python, Powershell;
Preferred Experience: Perform reverse of malicious samples and ability to clearly explain their behavior;
Level of English: Intermediate+.
Knowledge:
TTP strong understanding;
Cryptography: understanding basic principles, encoding, hashing;
UNIX Operating System concepts;
Yara rules experience;
OS virtualization: VMWare, Virtual machines;
Assembly language knowledge, at least basic;
Working with Sandbox and the ability to analyze their results: e.g: Cuckoo Sandbox, Any.Run, Joe Sandbox, etc;
Experience working with IDS;
Mitre Matrix knowledge.
Tools:
Network: strong knowledge of WireShark, tcpdump, etc;
Experience working with reverse engineering tools (IDA, Ghidra, Hopper, etc.);
Experience with debuggers:gdb, lldb , etc;
Experience working with System Monitoring tools: ProcMon, SysMon (Windows), auditd (Linux), Monitor.app, FortiAppMonitor (Mac OS);
Experience working with OsQuery and analyzing output;
Experience with tracing tools: dtrace, dtruss etc;
Working with VirusTotal, VirusShare, VirusBay in order to find new threats.
About UD
We are dedicated to supporting organizations around the world in planning, building, managing, and running successful security operations.Company website:
https://underdefense.com/
The job ad is no longer active
Look at the current jobs Python Lviv→
Average salary range of similar jobs in
analytics β
Similar jobs
Germany, United Kingdom, Ukraine
Characterization Engineer at UnameIT
Relocate, Ukraine
Ukraine
All jobs Python Lviv All jobs Under Defense