Reverse Engineer Resume Sample
Work Experience
- Hardware Design, Layout, and Prototyping
- Comfortable with Basic Electrical Engineering Tools
- Rework skills to include soldering, desoldering, mechanical and electrical assembly, PCB rework, and visual inspection
- Firmware Development for microcontrollers/processors including drivers and embedded applications
- Software Development to include C, Assembly (Intel, PPC, ARM, etc.), Linux Kernel and User Space
- Conduct detailed static reverse engineering of malware
- Create in-depth reports as deliverables of reverse engineering efforts
- Analyzing software applications and protocols
- Analyzing wireless and network communications
- Development of proof of concept code for selected vulnerabilities
- Responsible for server and systems administration, O&M and engineering and tactical operations tools. Experience/knowledge of forensic cyber testing on variety of hardware platforms. Experience/knowledge of RF environments
- Experience/knowledge of data collection and analysis
- Experience/knowledge in reverse engineering and automation tools
- Experience with LINUX/Unix, Windows Server, Windows 7/Vista/XP, SCCM, SCOM, SharePoint, Red Hat Administration, Microsoft Exchange, Powershell, Scripting, VMWare
- Additional Areas of expertise: Data preparation; data modeling and analytics; technical targeting and analysis
- Identifies, analyzes, and resolves operating/hardware system problems
- Support the company’s research and development efforts
- Analyze disassembly of x86 and x64 binaries
- Knowledgeable in the use of
- Analyzing SW applications and protocols
- Document findings and present and explain results to clients
- Responsible for thoughtful adherence to all SNC Policies, Procedures, and Compliance regulations (internal and external)
- Software Engineering experience
- Demonstrated experience in assembly (x86/x64/ARM/MIPS), SW reverse engineering, kernel debugging, and networking protocol stacks
- Experience with reverse engineering and replicating custom, undocumented protocols
- SW development experience in Assembly, C, and/or Python for development of proof of concept code
- Experience with tools such as IDAPro and Ollydbg
Education
Professional Skills
- Strong initiative, problem solving, and critical thinking skills
- Demonstrated experience reverse engineering and analyzing binaries of various types including: x86, x64, ARM (32 and 64 bit), C, C++, .NET, and Delphi
- Strong understanding of the PE file format and experience parsing structured or unstructured data
- Excellent writing and communication skill
- Demonstrated experience writing code (C, C++, Python, Perl, Java, etc.)
- Proven experience with IDA-Pro, Debuggers, and Network Traffic Analysis
- Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and Open Source (OllyDbg, Radare, GDB, etc.) malware analysis tools
How to write Reverse Engineer Resume
Reverse Engineer role is responsible for software, mechanical, training, integration, security, wireless, architecture, reporting, research, assembly.
To write great resume for reverse engineer job, your resume must include:
- Your contact information
- Work experience
- Education
- Skill listing
Contact Information For Reverse Engineer Resume
The section contact information is important in your reverse engineer resume. The recruiter has to be able to contact you ASAP if they like to offer you the job. This is why you need to provide your:
- First and last name
- Telephone number
Work Experience in Your Reverse Engineer Resume
The section work experience is an essential part of your reverse engineer resume. It’s the one thing the recruiter really cares about and pays the most attention to.
This section, however, is not just a list of your previous reverse engineer responsibilities. It's meant to present you as a wholesome candidate by showcasing your relevant accomplishments and should be tailored specifically to the particular reverse engineer position you're applying to.
The work experience section should be the detailed summary of your latest 3 or 4 positions.
Representative Reverse Engineer resume experience can include:
- Demonstrated experience writing code (C, C++, Python, etc.) to perform
- Experience flashing and using custom ROM's
- Experience utilizing commercial imaging tools such as Cellebrite and XRY
- Experience with soldering and de-soldering
- Experience with software engineering or reverse engineering
- Strong understanding of network protocols and networking concepts
Education on a Reverse Engineer Resume
Make sure to make education a priority on your reverse engineer resume. If you’ve been working for a few years and have a few solid positions to show, put your education after your reverse engineer experience. For example, if you have a Ph.D in Neuroscience and a Master's in the same sphere, just list your Ph.D. Besides the doctorate, Master’s degrees go next, followed by Bachelor’s and finally, Associate’s degree.
Additional details to include:
- School you graduated from
- Major/ minor
- Year of graduation
- Location of school
These are the four additional pieces of information you should mention when listing your education on your resume.
Professional Skills in Reverse Engineer Resume
When listing skills on your reverse engineer resume, remember always to be honest about your level of ability. Include the Skills section after experience.
Present the most important skills in your resume, there's a list of typical reverse engineer skills:
- Demonstrated experience in x86/x64 assembly, software reverse engineering, kernel debugging, and networking protocol stacks
- Demonstrated experience in analyzing disassembled code for x86-64 and ARM (32 and 64 bit)
- Demonstrated experience working with SQL-based databases and Big Data solutions
- Experience with programming and performing reverse engineering
- Experience with firmware analysis and reverse engineering using IDAPro or an equivalent tool
- Experience with one or more modern programming languages, including Python and C/C++
List of Typical Experience For a Reverse Engineer Resume
Experience For Senior Reverse Engineer Resume
- Experience with static and dynamic analysis of malicious binaries
- Performing reverse engineering of binary images for embedded systems
- Developing methods for modifying systems to include new capabilities
- Analyzing software for vulnerabilities and security weaknesses
- Creating new software images to be loaded onto embedded systems
- Expert with analyzing and disassembly of x86 and x64 binaries
- Thorough understanding of Windows Internals and memory management
- Embedded software development using assembly and C languages
Experience For Malware Reverse Engineer Resume
- Analyze daily phishing email campaigns and malicious indicators
- Write technical reports on malware, phishing campaigns, and cyber-attacks
- Leverage commercial and open source tools for reverse engineering
- Perform network enumeration and intelligence pivoting to expand findings
- Identify credible new intelligence and subject matter resources relative to current/emerging threats as they relate to the use of information technology
Experience For Senior Malware Reverse Engineer Resume
- Knowledge of Apple, Linux, and IOT malware
- Familiarity with variety of processors such as 8051, X86, and ARM
- Reverse engineer malware samples, builders, and panels
- Extract malware configuration files and IOCs
- Provide support to customers’ analysis requests
- Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers
- Conduct reverse-engineering for known and suspected malware files. Investigates instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration
- Provide detailed reports of any findings. Performs research in the area of malicious software, vulnerabilities, and exploitation tactics. Identify vulnerabilities in binaries, identify and analyze shell-code, and recommend preventative or defensive actions
- Responsible for providing intelligence analysis in order to identify threats
Experience For Reverse Engineer, Mid Resume
- Provide subject matter expertise to support various operations
- Relevant work experience including experience in reverse-engineering and code-level security auditing, as well as experience reading assembly and understanding of how to unpack obfuscated code
- Familiarity with tools such as IDA Pro or OllyDbg.
- Use expertise in malware reverse engineering and analysis to evaluate and analyze complex malicious code through the use of tools, including disassemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers
- Conduct reverse-engineering for known and suspected malware files. Investigate instances of malicious code to determine attack vector and payload, and to determine the extent of damage and data exfiltration
- Perform research in the area of malicious software, vulnerabilities, and exploitation tactics, and recommend preventative or defensive actions
Experience For CNO Reverse Engineer Resume
- Develop network and host based signatures to identify specific malware. Recommend heuristic or anomaly based detection methods
- Provide subject matter expertise in the detection, analysis and mitigation of malware, trends in malware development and capabilities, and proficiency with malware analysis capabilities
- Support the maintenance of malware analysis platforms and tool sets, identify requirements for new malware analysis capabilities, and contribute to the development of new malware analysis tools and techniques
- Tactical software development to support triage and analysis of datasets and information associated with APT activity and behavior as well as APT artifact analysis
- Experience performing software and malware reverse engineering, and forensics investigations
- Contributing host- and network-based detection signatures/scripts to a variety of Microsoft products and services
- Conducting triage and compressive analysis of known and suspected malicious applications, documents, network traffic and artifacts in support of MSTIC’s threat intelligence analysts, services and products
Experience For Lead Services Gearbox Reverse Engineer Resume
- Producing comprehensive and cursory malware analysis reports and actionable intelligence covering characteristics, capabilities, functionality and behavior of malicious files and artifacts
- Leveraging internal, commercial and open-source tools and data sources to identify, analyze and correlate similar and related malware specimens and campaigns
- Familiarity with iOS or Android operating systems
- Program in a language such as C, C++,.NET, Python, Java, etc
- Knowledge of common digital forensic techniques and practices
- Development/Analysis of mobile device applications
- Read and understand assembly code(ARM, x86, x64, etc.)
Experience For Lead Reverse Engineer Resume
- Work with Citi’s Security Incident Response Team (SIRT) to respond to incidents that involve malware
- Packers, virtual machines, and network sniffers. Provide the findings in a technical report with details of the malware, identification parameters, advanced capabilities, and mitigation strategies. Perform research in the area of malicious software, vulnerabilities, and exploitation tactics
- Knowledge of Linux or equivalent operating systems commonly found in embedded devices
- Document component designs within a High Level Design (HLD) document
- Plan and develop component integration tests
- In-depth knowledge of Microsoft Windows internals
- In-depth knowledge of Linux internals
- Software vulnerability analysis (fuzzers, shellcode development)
- General ability to solve complicated problems
Experience For Reverse Engineer Resume
- Create and suggest new analytics as your abilities and time allow for in Splunk
- Enable orchestration and automation of the entire system from start to maintenance through Puppet, Kickstart, Ansible, Bash/Python scripts, and more
- Analyze and unpack obfuscated code
- Familiarity with mitigation strategies and signatures such as Snort and YARA
- Produces clearly written and concise research reports
- Team player who works well under pressure to rapidly generate highly accurate technical reports
Experience For Senior Reverse Engineer Resume
- Knowledge of one or more assembly languages
- Knowledge of networking and common network protocols and security topics, including authentication, authorization, encryption, hashing, software attack methodologies, secure boot, and secure data storage
- Experience with programming, including Python, C, and Assembly
- Experience working with both strategic and tactical threat intelligence customers and evaluating their requirements
- Perform deep analysis of threats including reverse engineering malware & deconstructing attack campaigns
- Assist in researching and identifying malicious actors for the goal of taking down operations
- Read or write one or more assembly languages, including x86, ARM, MIPS, or PowerPC
Experience For Malware Reverse Engineer Resume
- Capable and comfortable communicating actionable threat intelligence to both technical and executive-level stakeholders
- Reverse-engineering & binary analysis to include dynamic and static malware analysis
- Windows internals - especially in the areas of event management and networking (sockets/RPC/named pipes)
- Fluency in any programming language (Python / C++ / JavaScript / etc)
- Familiarity with programming in Assembly for Intel architecture
- Working in the Information Security field
- Working remote
List of Typical Skills For a Reverse Engineer Resume
Skills For Senior Reverse Engineer Resume
- Forging and maintaining effective relationship and partnership with internal and external partners and organizations
- Experience in a security intelligence center or similar environment tracking threat actors and responding to incidents
- Experience reverse engineering different types of malware using IDA Pro/OllyDbg/WinDbg/etc
- Knowledge and experience working with online threats such as web vulnerabilities, exploit attacks and phishing scams
- This is an excellent opportunity for someone who is interested in joining a rapidly-expanding office within an established multinational organisation
- At least three years of programming knowledge/experience with either Windows Kernel, C, C++,
- Extensive experience coding in C and assembly on Linux, UNIX and/or Windows systems
Skills For Malware Reverse Engineer Resume
- Experience with one or more of the following debuggers
- Experience with analyzing network protocols
- Experience with dynamic analysis of software binaries using OllyDbg or WINDbg
- BS or MS in Computer Forensics, Science or Engineering, Information Systems or other relevant security field, or comparable experience
- Experience with employing a logical, structured approach to project execution
- Experience with conducting side channel attacks
- Experience with building custom toolchains
- Experience with analyzing source code for security vulnerabilities
Skills For Senior Malware Reverse Engineer Resume
- Experience in working with SAT and SMT solvers
- Demonstrated malware reverse engineering
- Development experience with malware analysis automation, such as IDA plugins, sandboxing, triage tools, etc..
- Experience in vulnerability research
- Experience with software development processes and related tools
Skills For Reverse Engineer, Mid Resume
- Experience with packet based communication such as TCP and UDP
- Capture the flag competition experience
- Strong self motivation and orientation toward results
- Strong technical written and verbal
- Experience with incident response, network defense, and threat intelligence
- Proven ability to analyze and unpack obfuscated code
- Experience with vulnerability discovery and exploitation
Skills For CNO Reverse Engineer Resume
- Experience in working with Software Defined Radios (SDRs)
- Experience in cryptography or cryptanalysis
- Previous experience as a vulnerability or threat researcher and/or intelligence analyst
- Experience working closely with threat intelligence analysts to understand their workflow and analytic problems and turning those into large-scale analytics
- Experience working with products and services to improve security for customers
- Experience of development involving extraction/manipulation/summarization of network data
- Experience working within a diverse organization to gain support for your ideas
- Experienced user of Ida Pro
Skills For Lead Services Gearbox Reverse Engineer Resume
- Experience reverse engineering and replicating custom, undocumented protocols
- Experience with research in at least one of the following: Cyber security, reverse engineering, vulnerability research, or exploit development
- BS in Computer Science, Computer Engineering or related disciplines, with at least 4 years of computer/network security industry experience
- Experience with vulnerability research and exploit development
- Software development experience in Assembly, C, and/or Python for development of proof of concept code
- Experience and knowledge of the tools involved in static & dynamic malware analysis
- Support the SOC and Incident Response Team with analysis and technical data to prioritize malware/threats and assist with detection methodologies and rules
- Experience conducting forensic analysis of networks and systems impacted by small and large APT related intrusions
Skills For Lead Reverse Engineer Resume
- 6 months hands on experience in one or more of
- Experience with data recovery tools (PC-3000) and techniques
- Experience with IDA Pro (or similar) RE development tool
- Experience with security related data analysis
- Experience imaging digital media
- Understanding of behavioral based threat models, including ATT&CK, Cyber Kill Chain, Diamond Model, etc
- Maintaining a deep understanding and knowledge of the latest offensive and defensive Tactics, Techniques and Procedures (TTPs)
Skills For Reverse Engineer Resume
- Analyzing known vulnerabilities when little information is publicly-available
- Writing network clients to trigger remote code execution (RCE) vulnerabilities
- Understanding of Windows or Linux Internals, embedded systems, device drivers
- Working knowledge of Computer Network Exploitation (CNE), Computer Network Attack (CNA) and Computer Network Defense (CND) tools and techniques
- Supporting incident response and deeply familiar with common incident response procedures, processes, and tools
- Providing support in development, maintenance and modernization of malware analysis platforms, tool sets and capabilities
- Knowledge of operating system fundamentals, including interrupts, threading, virtual memory, device drivers, boot procedures, and memory management techniques
- Knowledge of programming and scripting languages: Assembly x86/x64, C, C++, Python, JavaScript, Java, PHP, and HTML
- Basic understanding of operating system internals and Windows API
Skills For Senior Reverse Engineer Resume
- Deep understanding of operating system internals and Windows API
- Certifications: Certified Reverse Engineering Analyst (CREA), GIAC Reverse Engineering Malware (GREM)
- A deep understanding of advanced cyber threats targeting enterprises, along with the tools, tactics, and procedures used by those threats
- Clear, developed and engaging writing ability
- English writing and speaking proficiency
- Familiar working with an IDS and/or conducting traffic analysis
- A passion for low-level software development and engineering
- Knowledge of operating system internals, development and integration of code within the operating system kernel, kernel debugging, assembly (x86 and 64-bit Intel / AMD, MIPS)
- Knowledge of file systems, networking, and protocol stacks
Skills For Malware Reverse Engineer Resume
- In-depth knowledge of compilers, operating systems, and/or program analysis
- Familiarity with configuring network routers and switches
- TCP/IP network protocols or SQL programming
- Software compilers, operating system architecture, and/or device drivers
- Build and maintain complex Linux systems running CentOS and hardened to meet operational standards
- Create and update monitoring solutions to always know weak points throughout the system
List of Typical Responsibilities For a Reverse Engineer Resume
Responsibilities For Senior Reverse Engineer Resume
- Experience working with a variety of external partners working on sensitive threat intelligence issues
- Work independently under a deadline
- Connect and use JTAG or On-Chip debuggers
- Analyze or design circuit boards
- Experience with developing software systems in assembly, C, C++, or equivalent low-level proprietary languages on Windows, UNIX, Linux, VxWorks, or vendor-proprietary operating systems
- Experience with performing reverse engineering and vulnerability analysis of software binaries using IDA Pro or equivalent software and dynamic analysis of software binaries using OllyDbg, WINDbg, or equivalent software
- Analyze shellcode, and packed and obfuscated code, and their associated algorithms
- Familiarity with Linux OS and mobile iOS/Android forensics
- Published research papers at conferences or through other mediums (blogs, articles)
Responsibilities For Malware Reverse Engineer Resume
- Experience applying threat and data modeling, advanced data correlation, and statistical analysis to develop alerts, notable events, investigative dashboards, and metrics driven reports
- Demonstrated experience using Commercial (IDA Pro, Hex-Rays, WinDbg, etc.) and Open Source (OllyDbg, Radare, GDB, etc.) tools and methods to perform software and malware reverse engineering investigations
- Knowledge across all critical elements and common data types used in threat intelligence analysis, including: malware used in targeted adversary campaigns; and host and log forensics including methods of data collection and analytic techniques; and network forensics including common protocols and how those are used in adversary operations
- Experience analyzing malicious desktop, mobile and web applications developed in common programing languages such as x86/x86-64 Assembly, ARM, C, C++, C#, Visual Basic, PowerShell, Ruby, Python, ActionScript, ASP, Java, JavaScript, HTML, etc
- Knowledge of disassemblers, and fuzzing frameworks
- Research new and upcoming threats with the aim to develop defensive measures, detection policies and educational literature to inform the community
- Travel: 5% (for conferences / training / company events)
- A firm understanding of both client side and server side malware and their associated operations
Responsibilities For Senior Malware Reverse Engineer Resume
- A passion for fighting the evil that lurks online
- Work with automated exploit and malware collection systems
- Write blog posts to educate and inform users on current cyber threats, safeguard measures and useful cyber security knowledge
- Familiarity with virtual environments and virtualization tools, I.E. VMware, Virtual Box
- The ability to communicate well with internal team members, other company departments & both technical and non-technical users outside of the company
- Report to the Cyber Intelligence Team manager in Information Security’s Threat Detection and Response directorate to provide highly credible, timely, accurate, and relevant cyber intelligence services to security operations and senior executives
- Strong and in-depth knowledge of Windows OS internals and Windows API
Responsibilities For Reverse Engineer, Mid Resume
- Supporting incident response and familiarity with common incident response procedures, processes, and tools
- Certifications: Certified Reverse Engineering Analyst (CREA), GIAC Reverse Engineering Malware (GREM), or related certification
- Collect information and analyze malware for the purpose or reporting technical indicators and TTPs
- Act as a technical Subject Matter Expert for intelligence reporting
- Development of malware configuration extractors and string decoders
- Collaborate with other analysts both internally, and also with external organizations
- Experience with ArcSight, Anomali ThreatStream, FirePower (Sourcefire), Recorded Future, FireEye as well as tools use for malware analysis such as IDA Pro or other disassemblers and debuggers
Responsibilities For CNO Reverse Engineer Resume
- Demonstrated experience using commercial and open-source malware analysis tools and platforms such as debuggers, disassemblers, decompilers, sandboxes and virtualization solutions
- Demonstrated experience analyzing packed and obfuscated programs, scripts and shellcode
- Demonstrated experience identifying and subverting anti-disassembly, anti-decompilation, anti-debugging and anti-virtualization/emulation and anti-forensic techniques and methodologies
- Tactical software development experience in support of automation, triage and analysis of datasets, information and artifacts associated with APT related malware and campaign activity
- Demonstrated capability to coherently present potentially sensitive threat intelligence to a wide variety of audiences in public and private settings
- Computer, network and software vulnerability research, analysis and mitigation experience
Responsibilities For Lead Services Gearbox Reverse Engineer Resume
- Kernel and driver development experience
- Assembly language Experience
- Familiarity with legacy and modern software and system protection mythologies and technologies
- Analysis of crash and memory dumps
- Deep packet analysis of network data and development of custom decoders
- Experience leading analysis of network data across the various protocol layers and an applied understanding of a range of application/transport/network protocols
- BS in Computer Science or related field and 1-2+
- Reverse-engineer malware and incorporate analysis results into detailed reporting to include behavior, identified infrastructure used for command and control, and mitigation techniques. Develop network and host based signatures to identify specific malware. Recommend heuristic or anomaly based detection methods. Compare malware to existing malware signatures