Special Programs and Innovation Consultant
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting.
With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks.
Learn more about FireEye's world-class solutions and global footprint at https : / / www.fireeye.com / company.html.
If you have an interest or background in reverse engineering and are looking to apply those skills to real world Threat Intelligence problems then we want to hear from you!
On the Special Programs and Innovation (SPI) Team we are focused creating innovative solutions to keep FireEye on the front lines of Threat Intelligence.
Specifically, the SPI team focuses on applying engineering and technical expertise to develop projects which allow our customers to better utilize our data, and to create new and innovative ways for FireEye to collect Threat Intelligence.
One of SPI’s critical projects is our adversary emulation solution, which focuses on synthesizing FireEye’s intelligence to build industry-leading scenarios replicating adversary behavior, for use by Red Teams and Cyber Trainers.
This role would be focused on conducting security assessments backed by Mandiant Intelligence and advance technologies.
Conduct extensive research into current threat activity to determine customer-relevant threat intelligence
Distill threat intelligence about an adversary into actionable adversary emulation scenarios
Help scope and develop low-level software engineering projects which interact closely with the operating system
Apply reverse engineering skills to understand the tools, techniques, and procedures (TTPs) used by an adversary
Repurpose real world malware to create realistic attack scenarios
Work with a small team and build prototype products of the future
Provide mentoring to other Reverse Engineering Colleagues
Build and conduct trainings on new methodologies developed by SPI
Have extensive knowledge on how an Offensive Cyber Operation is conducted such as :
Network penetration testing and manipulation of network infrastructure
Mobile and / or web application assessments
Shell scripting or automation of simple tasks using Perl, Python, or Ruby
Developing, extending, or modifying exploits, shellcode or exploit tools
Developing applications in C#, ASP, .NET, ObjectiveC, Go, or Java (J2EE)
Reverse engineering malware, data obfuscators, or ciphers
Source code review for control flow and security flaws
Strong knowledge of tools used for wireless, web application, and network security testing
Thorough understanding of network protocols, data on the wire, and covert channels
Mastery of Unix / Linux / Mac / Windows operating systems, including bash and Powershell
Experience with CBEST / CGEST / TIBERs is an extreme plus!
Ability to document and explain technical details clearly and concisely
Ability to understand and communicate intelligence data
Can proficiently speak English / Arabic
Experience writing custom Red Team tools and payloads
Experience testing against and an understanding of Anti-Virus solutions
Experience with infrastructure deployment tools and frameworks such as Ansible and Terraform
Development experience with C, Python, and Go.
Experience with X86 and AMD-64 assembly and system architecture
Previous Government experience is a plus!