Malware Reverse Engineer Resume

Posted in Information Technology Resume Examples
Richard Ramsay

2774 Charla Lane

Irving, TX 75038

(333) 364-1521

Email : [email]

Career Goal
Seeking employment in your prestigious organization as a Malware Reverse Engineer and utilize my expertise in Malware, C, C++, Python, JavaScript, Unix and iOS.
Technical Skills
Vast knowledge of programs and concepts including:

  • Malware Analysis
  • Software Reverse Engineering
  • Computer Forensics

Thorough with programming languages:

  • C, C++, Python
  • JavaScript, Fortran
  • X86 Assembly

Proficient in utilizing networking protocols:

  • TCP/ IP
  • HTTP
  • IRC

High expertise in utilizing server software:

  • Blackberry
  • Citrix
  • Terminal server

Crystal clear with standards and requirements:

  • ISO 900x,CIP
  • Sarbanes Oxley

Adroit in using other technologies:

  • Capacity Planning
  • PBX
  • Thin Client

Solid understanding of operating systems like:

  • Windows
  • Linux
  • Mac

Sound capabilities to:

  • Create secure design specifications
  • Conduct in depth and end to end testing
Relevant Experience
Malware Reverse Engineer

Carroll Technology Services, Inc.

January 2012 – Present

Irving, TX

  • Conducted analysis of dynamic and static factors, and reverse engineering operations.
  • Prepared reports to record findings in Malware software analysis and related incident analysis and response.
  • Developed programs and projects according to GDAIS strategies, policies and procedures.
  • Provided technical assistance for conducting behavioral analysis of suspected malicious files.
  • Suggested improvement processes for development and maintenance of required tools to conduct malware analysis and reverse engineering.
  • Performed analysis of malware software through tools such as IDA Pro and Windows Sysinternal suite on daily basis.
  • Supported customer for mitigation against threats such as APT through continuous evaluation of network.
  • Generated technical reports to record cyber incidents and malware samples for sharing information with Intelligence community.
Malware Reverse Engineer

Harris Corporation

November 2010 – January 2012

Chantilly, VA

  • Conducted detailed reverse engineering activities about malicious code in programs.
  • Prepared technical documentation such as transition reports, presentation and technical information exchange papers.
  • Assisted in designing and prototyping of new analytical methods, tools and devices.
  • Provided technical assistance for identification and documentation of emerging and complex security threats.
  • Implemented procedures for designing of solutions through reports and technical exchanges.
  • Designed solutions for malicious software through advanced research and analysis.
  • Supported government clients and corporate customers with case management and complex reports.
  • Assisted in conducting network log analysis with tools such as Wire shark and Tcpdump.
Educational Background
Bachelor’s Degree in Computer Engineering

Western Michigan University

August 2006 – May 2010

Kalamazoo, MI

Professional Certification
GIAC Reverse Engineering Malware (GREM) certificationJuly 2010

  • 1.0.0Version
  • 138Download
  • 1File Count
  • March 1, 2020Create Date
  • March 1, 2020Last Updated

Create your own professional looking resume for free using our resume builder!