Cloudforce One Malware Reversing Engineer
Role details
Job location
Tech stack
Requirements
Cloudflare is a system spanning the globe, on a mission to make the internet better, safer, and more powerful everyday. To help fulfill this mission, we are seeking a talented Malware Reverse Engineer to join us in growing our Cloudforce One Organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and ever-evolving global threat actors. This position requires an innovative, self-starting, and detail-oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by sophisticated cyber threats. As a Cloudforce One Reverse Engineer, you will analyze malicious binaries with the goal of monitoring and disrupting cyber threat activity across multiple platforms, supporting both client requests and proactive internal research. You will serve an integral role in the discovery and analysis of cyber threat adversaries, working along side detection engineers to detect attacks and threat researchers to track them. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing and ever-evolving cyber attacks to protect our global customer base. Lastly, you will help expand our malware lab environment so that we may modernized and scale our operations to streamline malware analysis within Cloudflare. Our ideal candidate will have 7+ years of previous experience reverse engineering malware samples and can write reliable code, preferably in Python or Golang. Top candidates will have extensive experience with hands on static and dynamic analysis of common file formats on Windows, macOS, or UNIX-based platforms. We also would like our candidates to have experience writing code to process malware samples and interacting with APIs. As a member of the team you will be responsible for contributing to and deploying team codebases to coalesce traits of an attack. Outstanding candidates will also posses excellent verbal and written communication skills to facilitate dialogue with the Threat Research Team for reporting on malware and malware families. You will also work both as a self-driven individual contributor and alongside a team to achieve a common goal.
Examples of desirable skills, knowledge and experience
Possess mid-level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples. Reverse engineering experience with APT malware with an understanding of common infection vectors. Perform system analysis using best practice malware analytics methodologies on Windows, macOS, or UNIX/Linux platform. Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs. Practical malware analysis experience with static, dynamic, and automated malware analysis techniques. Knowledgeable of current malware techniques to evade detection and obstruct analysis. Experience with network protocol analysis and cryptography Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system Capable of updating analysis VMs and contributing to an analysis framework Contributions to enhancing collaborative malware analysis tools Experience writing malware reports on unique and interesting aspects of malware Experience with malware attribution Proficient with Yara and writing rules to detect similar malware samples Prior Government experience in malware tracking, analysis, and reporting
Bonus Points
Experience with tracking and identifying threats through Indicator of Compromising (IOCs) pivoting and infrastructure enumeration A conceptual understanding of how attackers conduct operations in regards to the MITRE Cyber Kill Chain Familiarity with bash command line executables to conduct static analysis and investigate IOCs.