Staff Reverse Engineer (Remote
Proofpoint
2021-11-05T05:16:48Z
Denver
Colorado
United States
Engineering
(No Timezone Provided)
It's fun to work in a company where people truly BELIEVE in what they're doing!
We're committed to bringing passion and customer focus to the business.
The Role
As a Staff Reverse Engineer on Proofpoint’s Threat Research team, you will be analyzing sophisticated malware in order to mitigate evasion, facilitate signature development, extract intelligence, support APT research and ultimately protect customers under active attack. You will be part of a highly respected, technically advanced team of security researchers and engineers dedicated to discovering, detonating, detecting and extracting intelligence from malware at unprecedented scale.
Your day-to-day
Analyze malware from internal and external sources, both self-directed and in response to evolving campaigns.Work with signature developers to create detections in Proofpoint’s core threat detection platformWork with APT researchers to facilitate the understanding, tracking, and attribution of nation-state actorsWork with sandbox detonation and deobfuscation experts to mitigate advanced anti-analysis techniquesWork with Machine Learning experts to facilitate the development of novel algorithms for discovering and classifying malwareInternally document malware analysis findings including the evolution of critical malware families over timeMonitor intelligence feeds, both internal and external, to stay on top of relevant threatsWork with writers to appropriately blog and highlight your workWork effectively as part of a globally distributed remote teamWhat you bring to the team
An unbridled passion for the reverse engineering and analysis of malwareA minimum of 1-3 years of demonstrable experience reverse engineering Windows malware as your primary job functionExperience using IDA Pro/Ghidra to statically analyze Windows malwareDeep understanding of userland Windows internals and the x86/IA64 architecture and instruction setExperience using a Windows debugger for dynamic malware analysisFamiliarity with common encryption algorithmsExperience overcoming common anti-analysis techniquesExperience sandboxing malware Python experienceThe ability to work independently and self-prioritize as a Senior level researcherA desire and ability to share your discoveries internally in order to ultimately protect customers (team player)A desire to publish appropriate aspects of your work through blogsNice to have
Information security community experience; a blog, website, published papers, conference presentations, or other experience on the public side of the security fieldExperience working remotely for a large information security vendorSignature writing experience using tools such as yara, snort, suricata, and ClamAVAn expert level understanding of some segment of the Windows malware landscape (Loaders, Bankers, RATs, etc.)#LI-EC1
If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!
Staff Reverse Engineer (Remote
It's fun to work in a company where people truly BELIEVE in what they're doing!
We're committed to bringing passion and customer focus to the business.
The Role
As a Staff Reverse Engineer on Proofpoint’s Threat Research team, you will be analyzing sophisticated malware in order to mitigate evasion, facilitate signature development, extract intelligence, support APT research and ultimately protect customers under active attack. You will be part of a highly respected, technically advanced team of security researchers and engineers dedicated to discovering, detonating, detecting and extracting intelligence from malware at unprecedented scale.
Your day-to-day
Analyze malware from internal and external sources, both self-directed and in response to evolving campaigns.Work with signature developers to create detections in Proofpoint’s core threat detection platformWork with APT researchers to facilitate the understanding, tracking, and attribution of nation-state actorsWork with sandbox detonation and deobfuscation experts to mitigate advanced anti-analysis techniquesWork with Machine Learning experts to facilitate the development of novel algorithms for discovering and classifying malwareInternally document malware analysis findings including the evolution of critical malware families over timeMonitor intelligence feeds, both internal and external, to stay on top of relevant threatsWork with writers to appropriately blog and highlight your workWork effectively as part of a globally distributed remote teamWhat you bring to the team
An unbridled passion for the reverse engineering and analysis of malwareA minimum of 1-3 years of demonstrable experience reverse engineering Windows malware as your primary job functionExperience using IDA Pro/Ghidra to statically analyze Windows malwareDeep understanding of userland Windows internals and the x86/IA64 architecture and instruction setExperience using a Windows debugger for dynamic malware analysisFamiliarity with common encryption algorithmsExperience overcoming common anti-analysis techniquesExperience sandboxing malware Python experienceThe ability to work independently and self-prioritize as a Senior level researcherA desire and ability to share your discoveries internally in order to ultimately protect customers (team player)A desire to publish appropriate aspects of your work through blogsNice to have
Information security community experience; a blog, website, published papers, conference presentations, or other experience on the public side of the security fieldExperience working remotely for a large information security vendorSignature writing experience using tools such as yara, snort, suricata, and ClamAVAn expert level understanding of some segment of the Windows malware landscape (Loaders, Bankers, RATs, etc.)#LI-EC1
If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!