Contract Type:Type:
Permanent employment
Education Level:Education:
Bachelor (EQF 6)
Published on:Published:
01/10/2024
Group-IB is a partner of INTERPOL, Europol, and a cybersecurity solutions provider, recommended by SWIFT and OSCE. Such partnerships give us advantages in our everyday duties.
We are looking for a Junior reverse engineer to join our Threat Intelligence team in Amsterdam. Together we’ll conduct deep research on malware and public presentation of complex research, participate in IR, and perform at conferences and in mass media. Our reports are used by thousands of people all over the world. And we invite you to become a part of a great adventure!
Tasks to solve
- Research of malware primarily on architecture: x86, x86-64, ARM and OS: Windows (including .NET), Linux, Android.
- Research malicious tools including scripts, documents, e-mails, and network traffic.
- Research of different exploits.
- Creation of rules to detect and hunt malicious tools – YARA, Suricata, SIGMA, behavioral python scripts.
- Creating scripts for automatization of analysis for different tools: IDA Pro, BinaryNinja, Ghidra, x64dbg, JEB, etc.
- Analytical work during the research of a bunch of malicious tools, and attacker infrastructure – for attribution of samples and indicators to various groups and/or attacks, finding (common) patterns in different malicious objects, and creation of the hunting rules.
- Preparing reports that include results of the above-described tasks/or preparation of public articles or presentations.
- Working with VirusTotal, public sandboxes, Group-IB MXDR.
This role is perfect for you if
- Experience of working with RE tools: IDA Pro/BinaryNinja/Ghidra/etc; x64dbg/Immunity Debugger/OllyDbg/etc; and WinDbg.
- Basic knowledge of Python.
- Base knowledge of the cyber threat industry.
- Good knowledge of technical language and ability to write technical reports.
- Knowledge of techniques used by cybercriminals and malware authors.
- Fluent Dutch and English.