Responsibilities
Peraton is currently seeking a Senior Technical Manager (Malware) to lead a team of analysts and engineers on a long-term government customer with the Federal Strategic Cyber group.
This position allows the ability to telework 50% of the time. You must be local to the Arlington, VA area and be able to work on-site if required based on business conditions/needs.
The Senior Technical Manager has expertise in malware reverse engineering and cyber analysis to evaluate and analyze complex malicious code through the use of tools, including dissemblers, debuggers, hex editors, unpackers, virtual machines, and network sniffers.
Experience reverse-engineering for known and suspected malware files. Investigates instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data ex-filtration. Provides detailed reports of any findings. Performs research in the area of malicious software, vulnerabilities, and exploitation tactics.
Identifies vulnerabilities in binaries, identifies and analyzes shell-code, and recommends preventative or defensive actions. Reverse-engineers malware and incorporates analysis results into detailed reporting to include behavior, identified infrastructure used for command and control, and mitigation techniques. Develops network and host based signatures to identify specific malware. Recommends heuristic or anomaly based detection methods. Compares malware to existing malware signatures.
Technical Role & responsibilities:
- The primary responsibility will focus on isolating, reviewing, analyzing, and reverse-engineering malicious binaries to determine functionality and capability.
- The Malware Reverse Engineer will analyze samples and provide a written technical report related to the scope, nature, and characteristics of the malicious code.
- Supports active operations and presents the candidate with cutting edge challenges in the malware arena.
- Recommend counter measures to malware and other malicious type code and applications that exploit customer communication systems.
- Conduct reverse engineering for known and suspected malware files.
- Develop policies and procedures to investigate malware incidents for various computer networks.
Manager Roles and Responsibilities :
- As the team lead, you will be, responsible for the management of quality performance of a high-performing technical team, leading subordinate personnel, in accordance with contract requirements, company policies, procedures, and guidelines.
- Lead a multi-disciplined, multi-company program team and decisions related to resource allocation, work assignment, schedule management, risk and opportunity management, and quality attainment in meeting program milestones and objectives.
- Be responsible for meeting operational service level objectives, metrics, and subcontractor management.
- Engage customers to help define future requirements, identify technology insertion candidates, propose joint technology pilots and demonstrations, and engage Government leads and contractors in support of the customer’s cybersecurity mission.
- Utilize prior defensive Cyber operations experience and contribute a deep understanding of Cyber intelligence functions, including traditional analysis and products developed to support FSLTT customers.
Qualifications
Basic Qualifications
- Bachelor’s degree and a minimum of 12 years related technical experience; or a Master’s degree and minimum of 10 years’ experience. An additional 6 years of experience may be substituted in lieu of degree.
- Experience managing technical teams and making decisions related to resource allocation, work assignment, schedule management, risk and opportunity management, and quality attainment in meeting program milestones and objectives.
- Experience with and ability to examine malicious applications from a variety of operating systems such as Linux, Mac, Windows, IOS and Android operating systems, and IOT network devices.
- Experience with two or more of the following tools:
- Ida-Pro
- Ollydbg
- X64dbg
- Scyllax64
- Objdump
- Readelf
- Ghidra
- Process Explorer
- CFF Explorer
- Wireshark
- Fiddler
- Regshot
- Process Monitor
- Process Hacker
- Experience in reverse engineering and file reconstruction.
- Ability to perform static and dynamic analysis of applications and scripts.
- Ability to unpack and de-obfuscate highly complex malicious applications.
- Debugging and Debugger experience (Experience identifying and defeating known or custom packers).
- Disassembling/disassemblers experience.
- Active PMP or willingness and ability to obtain a PMP certification
- U.S. citizenship and an active Top Secret security clearance with the ability to obtain a TS/SCI is required.
- In addition, selected candidate must be able to obtain and maintain a favorably adjudicated DHS background investigation (EOD) for continued employment.
Preferred Skills:
- Experience with Python
- Knowledge of Java, C, C++, .NET, PowerShell, Golang, C#,
- Experience with ICS/SCADA systems
#LI-TR1
Peraton Overview
Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated national security solutions and technologies that keep people safe and secure. Peraton serves as a valued partner to essential government agencies across the intelligence, space, cyber, defense, civilian, health, and state and local markets. Every day, our employees do the can’t be done, solving the most daunting challenges facing our customers.
Target Salary Range
$135,000 – $216,000. This represents the typical salary range for this position based on experience and other factors.
EEO Tagline (Text Only)
An Equal Opportunity Employer including Disability/Veteran.