Returning Candidate?

Sr. Cybersecurity Malware-Reverse Eng. Specialist w/ Polygraph

Sr. Cybersecurity Malware-Reverse Eng. Specialist w/ Polygraph

Requisition ID 
# of Openings 
Job Location 
Job Function 
Information Technology
Security Clearance Level 
Top Secret/SCI with Polygraph
Full/Part Time 
Full Time

More information about this job

Job Description

The Specialist will assist in the prioritization of all malware reverse engineering work, assignment of caseloads, and deliverables.


1. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.


2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.


3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.


4. Evaluate firewall change requests and assess organizational risk.


5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.


6. Assists with implementation of counter-measures or mitigating controls.


7. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.


8. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.


9. Prepares incident reports of analysis methodology and results.


10. Provides guidance and work leadership to less-experienced technical staff members.


11. Maintains current knowledge of relevant technology as assigned.


12. Participates in special projects as required.









Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.


  • Must possess a TS/SCI Full Scope Lifestyle polygraph clearance
  • Bachelor’s Degree in Engineering, Computer Science, Cyber Security, Digital Forensics
  • Minimum 7 years’ of progressively responsible experience performing software and malware reverse engineering, forensics investigations, cyber security incident response
  • Minimum of 5 years’ of experience specifically conducting software and malware reverse engineering investigations
  • Experience performing software and malware reverse engineering, forensic investigations, cyber security incident response, with specific experience conducting software and malware reverse engineering investigations
  • Strong analytical and problem solving skills
  • Experience using commercial and open source software and malware reverse engineering tools.
  • Experience writing code (C, C++, Python, etc.)
  • Experience analyzing and disassembling x86-64, ARM 32 and ARM 64 bit.
  • Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and Open Source (OllyDbg, Radare, GDB, etc.) tools and methods to perform software and malware reverse engineering investigations

Desired Qualifications:

  • Master’s degree in Cyber Security or other related IT discipline.
  • Experience identifying vulnerabilities and modifications to hardware.
  • Understanding of computer engineering and hardware design including digital logic design and printed circuit board design.
  • Understanding of hardware-level security exploits including signal injection and side-channel analysis.
  • Experience in soldering, including equipment and materials required to perform removal and replacement of surface mount devices.
  • Experience in the operation and use of digital oscilloscopes, spectrum analyzers, multi-meters, logic analyzers, signal generators, and specialized radio test systems.


  • relevant certifications Certified Reverse Engineering Analyst (CREA), GIAC Reverse Engineering Malware (GREM)
  • Experience in hardware reverse engineering.
  • Experience with data recovery tools (PC-3000) and techniques.
  • Experience performing low-level data extraction (JTAG, chip-off, etc.)
As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities.


#DPost #CJPost

Need help finding the right job?

We can recommend jobs specifically for you! Click here to get started.