What are the responsibilities and job description for the Cyber Research Engineer position at CyberSN?
Our client, a critical partner to select federal agencies and commercial entities, specializing in next-generation cybersecurity research projects is looking for a Cyber Research Engineer who will be instrumental in leading projects building out tooling to solve future cyber threats.
Location: Basking Ridge, NJ or Silver Springs, MD (3-4 days/week)
Requirements:
- Coding experience: C, C , and/or Python
- Cybersecurity Research experience
- Top Secret or TS/SCI clearance
Responsibilities:
70% - Cyber Software Engineering
• Provide software development expertise and align the development process with cybersecurity best practices
• Improve and execute architecture design for security features
• Conduct threat modeling exercise against the codebase and development architecture
• Architect and design security-focused tools and services
• Develop tools and utilities that benefit the cyber security program
• Maintain an awareness of various programming languages
• Understand multiple programing languages
• Conduct vulnerability assessments and providing remediating guidance throughout the software development lifecycle
• Participate in red and blue team exercises
• Maintain an understanding of various cloud architecture and software-defined networks
• Awareness of cloud architectures
15% - Research: Software
• Researching software exploitation and vulnerability enumeration
• Memory (heap, stack and virtual memory) review and analysis
• Reverse engineering with debuggers and disassemblers
• Dynamic Binary Analysis
15% - Research: Threats
• Perform research into malware development and trends
• Create behavioral models to detect malicious behaviors shared across multiple malware families
• Research and analyze shellcode
• Assembly
• Review, isolate, analyze scripts, binaries, fileless executable, files, emails, URLs for malicious attributes and risk determinations
• Static analysis methods
• Dynamic analysis methods
• Research and review the detection and/or prevention capabilities
• Reverse engineering malicious binaries for analysis and research
• Reverse Engineering Tools
• Perform OSINT collection and threat profile analysis
• Research threat actor analysis and capability
ENVIRONMENT & TOOLS:
AWS / Kubernetes / Docker / Ansible / Terraform / Python, C, C / IDA Pro, x86
Recommended Skills
- Architecture
- C (Programming Language)
- Heap (Data Structure)
- Python (Programming Language)
- Research Experiences
- Reverse Engineering