Bachelor's degree in Computer Science, related field, or equivalent practical experience.
2 years of experience analyzing malware.
Experience with Golang, Python, C/C++, or Rust.
Experience using disassemblers and debuggers to ascertain the functionality of x86 and amd64 assembly language code.
Experience with working on PE-COFF or ELF files.
Nice to haves:
Experience analyzing packed and obfuscated code.
Understanding of common network protocols, including UDP, TCP, and HTTP.
Understanding of common software exploits.
Ability to identify and neutralize anti-reverse engineering measures.
Excellent writing YARA signatures and triaging false/true positive skills.
What you'll be doing:
Perform static and dynamic malware analysis on a wide variety of platforms, architectures, and runtimes.
Write technical malware reports to support intrusion investigations, alert triage, intelligence reports, and more.
Develop plugins to extract malware configuration from diverse malware families.
Participate in development tasks for existing research initiatives with minimal assistance from executive analysts.
Perks and benefits:
Information collected and processed as part of your Google Careers profile and job applications is subject to Google's Applicant and Candidate Privacy Policy.
Equal opportunity and affirmative action employer.
Global collaboration and communication facilitated by English proficiency requirement.
Ability to request accommodations using the Accommodations for Applicants form.