The mission of the FLARE team at Google Cloud is to provide the world's most trusted reverse engineering capabilities. Malware analysis is our primary deliverable, providing pertinent and actionable details in a timely fashion. We also use and improve automated methodologies to scale our impact. Utilizing a variety of techniques and tool-sets for both static and dynamic methodologies, our aim is to provide the information that organizations need for threat identification, location, and hunting purposes.
As a Reverse Engineer at Mandiant, Google Cloud, you will be responsible for performing static and dynamic malware analysis on a wide variety of platforms, architectures, and runtimes. You will write technical malware reports to support intrusion investigations, develop plugins to extract malware configuration, and participate in research initiatives.
This role requires a Bachelor's degree in Computer Science or related field, with at least 2 years of experience analyzing malware. You should have experience with languages like Golang, Python, C/C++, or Rust, and be proficient in using disassemblers and debuggers to analyze x86 and amd64 assembly language code. Experience with PE-COFF or ELF files is also required.
Preferred qualifications include experience in analyzing packed and obfuscated code, understanding of common network protocols and software exploits, ability to identify and neutralize anti-reverse engineering measures, and excellent skills in writing YARA signatures and triaging false/true positives.
Join our team to contribute to Google Cloud's mission of providing enterprise-grade solutions and cutting-edge technology to help organizations digitally transform their businesses across more than 200 countries and territories.