Conduct in-depth malware analysis and reverse engineering. Clearly communicate technical findings to a variety of clients and internal stakeholders Assist in ongoing research, development, and testing of enhanced malware analysis techniques, processes, and procedures. Collaborate across multiple service lines including digital forensics / incident response, managed services, expert witness, and threat intelligence. Support the development of proposals, statements of work, and new business opportunities.
Proficient in various languages such as: Python, PowerShell, x86/x64/ARM Assembly, .NET, Go, C/C++/C#, Java, JavaScript Proficient in malware analysis and RE tools such as: Ghidra, IDA, x64dbg/x32dbg, WinDbg Proficient in a variety of code analysis and reverse engineering analysis tools and techniques, such as debugging, decompiling, and disassembling. Understanding of information security basics especially in the realm of security incident response Strong team, project, and client management experience Strong written and verbal communication skills Flexible team player, with strong interpersonal skills Relevant cyber security certifications including GREM, GXPN, GCFA a plus. Ability to travel up to 25% as required to support response activities.
Bachelor’s degree required; master’s degree or similar advanced degree is preferred. 10 years+ overall experience & 5 years+ of relevant work experience in malware analysis and reverse engineering Low level understanding of Windows operating system architecture fundamentals (NTFS, registry, processes, binaries, DLL’s, etc.) and administration. Similar understanding of MacOS and/or Linux a plus Experience with and understanding of common malware behavior and persistence mechanisms.
About Kroll
#LI-IW1