ASD 4, 5 & 6 Malware Analysts & Malware Engineers TTV Branch have vacancies in specialist teams who reverse engineer malware and develop their own sophisticated tools to do so.
These are technical roles, requiring an aptitude for complex problem solving and a curiosity for understanding the functionality, origin and potential impacts of malware.
We want you to reverse-engineer malware, and develop analytic automation and tools to defend Australian networks against malicious threats.
While formal experience in cyber security, specifically malware analysis, is desirable, ASD is also interested in applicants looking at getting into this field with demonstrable experience in software development, programming, mathematics, or computer sciences, and interest in solving interesting technical problems/challenges.
About our Team ASD invites you to take the next step in your career.
We are looking for individuals with a passion for understanding, discovering and countering cyber threats impacting Australia and its interests.
The Technical Threats and Visibility (TTV) Branch in the Australian Cyber Security Centre (ACSC) detects adversaries targeting or exploiting Australian networks, through analysing their technical tools and tradecraft.
The ACSC uses this deep understanding to defend and disrupt malicious activity from cyber threat actors.
ASD's Malware Analysis and Discovery section specialise in understanding emerging technical threats facing priority Australian networks.
This section works across ASD, the broader intelligence community and with industry partners to discover previously unknown threats targeting priority Australian networks, deconstruct and understand sophisticated state-sponsored malware, and enable defensive opportunities through evidence-based understanding of technical tradecraft.
Our Ideal Candidate We are looking for people who are keen to tackle very hard, but interesting problems.
You need to work well in a team, exercise high levels of initiative, enthusiasm for reverse engineering, and demonstrate a resolve to protecting Australia.
In return, we will invest in your career with rewarding opportunities, excellent training, and a competitive employment package to retain skilled employees.
At the ASD 4 level you must demonstrate exposure to the above areas or related fields, and be progressing efforts to attain technical skills.
At the ASD 5 level you must demonstrate experience in the above areas or related fields, and possess relevant technical skills.
At the ASD 6 level you must demonstrate significant experience in the above areas or related fields, and possess well-developed technical skills.
It is expected that you will lead bodies of work.
We are looking for candidates who have experience in one or more of the following disciplines.
The expected depth of knowledge is dependent on the classification and stream applied for (ASD 4, 5 or 6): Malware Analyst Familiarity with Microsoft OS internals and APIs.
Experience with assembly (in particular x86 and x64 instruction sets) or low level programming languages such as C. Experience in high-level programming and scripting languages (Python preferred).
Proficiency with reverse engineering tools (disassemblers, debuggers and decompilers).
Understanding of malware reverse engineering processes including unpacking, deobfuscation and code reconstruction.
Ability to develop and enhance automation tools to assist the malware analysis process.
Ability to develop and modify signatures to detect and hunt for malware at scale.
Malware Engineer Experience with implementing, developing, and testing software using innovative technologies and frameworks.
Demonstrated experience collaborating within software engineering teams through practices such as pair programming, code reviews and technical workshops.
Proficiency in multiple software languages such as Python, Golang and Typescript.
Sound understanding of the Git source code management tool, and experience using Github, Gitlab and/or Bitbucket.
Demonstrated experience applying DevSecOps principles, including continuous integration and deployment to automate development processes.
Experience with Kubernetes, container orchestration and scalable distributed applications.
Experience with secure coding practices such as image signing, access control and audit logging.
Application Closing Date: Sunday 20 October, 2024 #J-18808-Ljbffr