Key Responsibilities
• Reverse engineer and analyze various forms of malware, including rootkits, Trojans, and exploits.
• Develop and implement low-level C code for security tools, detection mechanisms, and exploit mitigation techniques.
• Perform static and dynamic analysis of malicious code.
• Understand and exploit operating system internals, memory management, and hardware interactions.
• Contribute to the design and architecture of secure software solutions.
• Document findings, code, and methodologies clearly and comprehensively.
• Stay abreast of the latest malware trends, vulnerabilities, and defensive strategies.
Required Skills & Experience
• Proficiency in C/C++ programming with a deep understanding of low-level concepts.
• Proven experience in malware analysis, reverse engineering, and exploit development.
• Familiarity with assembly language (x86, x64, ARM).
• Experience with debugging tools (e.g., GDB, WinDbg) and disassemblers (e.g., IDA Pro, Ghidra).
• Strong understanding of operating system internals (Windows, Linux, or macOS).
• Knowledge of networking protocols and security principles.
• Experience with memory corruption vulnerabilities and exploitation techniques.
IT project outsourcing company