FireEye, Inc. Principal Reverse Engineer - REMOTE USA in New York, New York
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks.Learn more about FireEye's world-class solutions and global footprint at.Job Description
Mandiant's Front Line Applied Research and Expertise (FLARE) team works on our in-depth reverse engineering and malware analysis support to various functions of the Mandiant Solutions business. By utilizing front-line knowledge gained from incident response engagements, malware samples, and globally deployed FireEye products, FLARE is able to find evil and expand wisdom.
If you have strong programming skills, experience in malware analysis or reverse engineering, and are looking for an opportunity to collaborate with an industry-leading team, then this may be the opportunity for you. As a reverse engineer working within FLARE you will dissect attacker tools and backdoors in support of incident responders. You will also help develop innovative tools to aid other business lines and automate malware analysis and reverse engineering efforts.
This position can be based out of Reston, VA or New York, NY; the team will consider remote locations within the US for well-qualified candidates.
What You Will Do:
Analyze executables and malicious files
Collaborate with a team of experienced malware analysts and researchers
Develop novel solutions to challenges facing incident responders and malware analysts
Support the company's research and development effortsQualifications
Strong programming skills
Ability to analyze disassembly of x86 and x64 binaries
Knowledgeable in the use of:
IDA Pro disassembler
User- and kernel-mode debuggers
Common binary file formats
Dynamic analysis tools
Network analysis tools
Ability to reverse engineer binaries of various types including:
Understanding of software exploits
Experience developing scripts to decode obfuscated data and network communications
Experience developing applications in C, C++, and .NET
Thorough understanding of network protocols
Experience mitigating anti-reverse engineering techniques
Ability to analyze shellcode
Ability to analyze packed and obfuscated code
Capable of Python scripting to automate analysis tasks
Capable of identifying host- and network-based indicatorsAdditional Information
At FireEye we are committed to our #OneTeam approach combining diversity, collaboration, and excellence. All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability.