When writing a Malware Reverse Engineer Resume remember to include your relevant work history and skills according to the job you are applying for. Whether you're seeking an entry-level position or have been in your career for a few years, exposing your relevant achievements in your resume can allow you to stand out and get that job interview.
This resume example is a great representation of what a hiring manager is looking for in a Malware Reverse Engineer Resume. Feel free to use this example for reference as you create your own resume or use this easy resume builder that will guide you through every step of your building your resume in just a few minutes.
Richard Ramsay
2774 Charla Lane
Irving, TX 75038
(333) 364-1521
Email : [email] |
|
Career Goal |
Seeking employment in your prestigious organization as a Malware Reverse Engineer and utilize my expertise in Malware, C, C++, Python, JavaScript, Unix and iOS. |
|
Technical Skills |
Vast knowledge of programs and concepts including:
- Malware Analysis
- Software Reverse Engineering
- Computer Forensics
Thorough with programming languages:
- C, C++, Python
- JavaScript, Fortran
- X86 Assembly
Proficient in utilizing networking protocols:
High expertise in utilizing server software:
- Blackberry
- Citrix
- Terminal server
Crystal clear with standards and requirements:
- HIPPA, FISMA
- ISO 900x,CIP
- Sarbanes Oxley
Adroit in using other technologies:
- Capacity Planning
- PBX
- Thin Client
Solid understanding of operating systems like:
Sound capabilities to:
- Create secure design specifications
- Conduct in depth and end to end testing
|
Relevant Experience |
Malware Reverse Engineer
Carroll Technology Services, Inc. |
January 2012 – Present
Irving, TX |
|
- Conducted analysis of dynamic and static factors, and reverse engineering operations.
- Prepared reports to record findings in Malware software analysis and related incident analysis and response.
- Developed programs and projects according to GDAIS strategies, policies and procedures.
- Provided technical assistance for conducting behavioral analysis of suspected malicious files.
- Suggested improvement processes for development and maintenance of required tools to conduct malware analysis and reverse engineering.
- Performed analysis of malware software through tools such as IDA Pro and Windows Sysinternal suite on daily basis.
- Supported customer for mitigation against threats such as APT through continuous evaluation of network.
- Generated technical reports to record cyber incidents and malware samples for sharing information with Intelligence community.
|
|
Malware Reverse Engineer
Harris Corporation |
November 2010 – January 2012
Chantilly, VA |
|
- Conducted detailed reverse engineering activities about malicious code in programs.
- Prepared technical documentation such as transition reports, presentation and technical information exchange papers.
- Assisted in designing and prototyping of new analytical methods, tools and devices.
- Provided technical assistance for identification and documentation of emerging and complex security threats.
- Implemented procedures for designing of solutions through reports and technical exchanges.
- Designed solutions for malicious software through advanced research and analysis.
- Supported government clients and corporate customers with case management and complex reports.
- Assisted in conducting network log analysis with tools such as Wire shark and Tcpdump.
|
|
Educational Background |
Bachelor’s Degree in Computer Engineering
Western Michigan University |
August 2006 – May 2010
Kalamazoo, MI |
|
Professional Certification |
GIAC Reverse Engineering Malware (GREM) certification |
July 2010 |
|
-
1.0.0Version
-
--Download
-
1File Count
-
March 1, 2024Create Date
-
March 1, 2024Last Updated
Average Rating
☆☆☆☆☆
★★★★★
Be the first one to review