Reverse Engineer (offline)

Qualifications:
Technical skills: Bash, Python, Powershell;
Preferred Experience: Perform reverse of malicious samples and ability to clearly explain their behavior;
Level of English: Intermediate+.

Knowledge:
TTP strong understanding;
Cryptography: understanding basic principles, encoding, hashing;
UNIX Operating System concepts;
Yara rules experience;
OS virtualization: VMWare, Virtual machines;
Assembly language knowledge, at least basic;
Working with Sandbox and the ability to analyze their results: e.g: Cuckoo Sandbox, Any.Run, Joe Sandbox, etc;
Experience working with IDS;
Mitre Matrix knowledge.

Tools:
Network: strong knowledge of WireShark, tcpdump, etc;
Experience working with reverse engineering tools (IDA, Ghidra, Hopper, etc.);
Experience with debuggers:gdb, lldb , etc;
Experience working with System Monitoring tools: ProcMon, SysMon (Windows), auditd (Linux), Monitor.app, FortiAppMonitor (Mac OS);
Experience working with OsQuery and analyzing output;
Experience with tracing tools: dtrace, dtruss etc;
Working with VirusTotal, VirusShare, VirusBay in order to find new threats.

About UD

We are dedicated to supporting organizations around the world in planning, building, managing, and running successful security operations.

Company website:
https://underdefense.com/

The job ad is no longer active

Look at the current jobs Python Lviv→

Similar jobs

Python Developer at NikCode

Germany, United Kingdom, Ukraine

Characterization Engineer at UnameIT

Relocate, Ukraine


All jobs Python Lviv    All jobs Under Defense