5+ years of experience in reverse engineering malware that are associated with APT or financially motivated groups
In-depth technical knowledge of adversary capabilities, infrastructure, and techniques that can be applied to define, develop, and implement the techniques to discover and track the adversaries of today and identify the attacks of tomorrow.
Tactical software development to support triage and analysis of datasets and information associated with APT activity and behavior as well as APT artifact analysis.
Conducting triage and compressive analysis of known and suspected malicious applications, documents, network traffic and artifacts in support of MSTIC’s TI analysts, services, and products
Reverse engineering & binary analysis to include dynamic and static malware analysis. Experienced user of static analysis tooling (e.g., IDA Pro, Ghidra etc.)
Maintaining a deep understanding and knowledge of the latest offensive and defensive Tactics, Techniques and Procedures (TTPs)
Knowledge across all critical elements and common data types used in threat intelligence analysis, including malware used in targeted adversary campaigns; host and log forensics including methods of data collection and analytic techniques; and network forensics including common protocols and how those are used in adversary operations.
Preferred Qualifications:
Proven knowledge of Windows OS internals and Windows API
Demonstrated experience analyzing malicious desktop, mobile and web applications developed in common programming languages such as x86/x86-64 Assembly, ARM, C, C++, C#, Visual Basic, PowerShell, Ruby, Python, ActionScript, ASP, Java, JavaScript, HTML, etc.
Demonstrated experience using commercial and open-source malware analysis tools and platforms such as debuggers, disassemblers, decompilers, sandboxes and virtualization solutions
Demonstrated experience analyzing packed and obfuscated programs, scripts, and shellcode
Demonstrated experience identifying and subverting anti-disassembly, anti-decompilation, anti-debugging and anti-virtualization/emulation and anti-forensic techniques and methodologies
Tactical software development experience in support of automation, triage and analysis of datasets, information and artifacts associated with APT related malware and campaign activity
Familiarity with legacy and modern software and system protection mythologies and technologies
Demonstrated experience working with SQL-based databases and Big Data solutions
Experience working closely with threat intelligence analysts to understand their workflow and analytic problems and turning those into large-scale analytics
Demonstrated capability to coherently present potentially sensitive threat intelligence to a wide variety of audiences in public and private settings