On the FLARE (FireEye Labs Advanced Reverse Engineering) team we see malware in many different file types. A critical piece of our workflow in analyzing malware is automatically extracting features and behaviors using sandboxes and other analysis tools. The goal of this project is to research and develop new analysis tools that can be used to automatically extract features or otherwise analyze malware samples.
To accomplish this project, the intern will first gain an understanding of malware analysis processes used by the FLARE team and will then be given a research or development task, prioritized by FLARE, to deliver. Sample projects may include creating a tool to defeat a specific anti-analysis technique, creating instrumentation to extract binary features, or working to automatically extract malware configurations.
The goals of the FLARE intern are twofold: to provide an opportunity to introduce the art of malware analysis, and to improve the capacity of the FLARE team. A successful intern will study reverse engineering resources, including the courses offered by Mandiant, so that they may attain the title of "Reverse Engineer" and be considered when applying to the FLARE team. The FLARE team has a strong history of converting interns into full time employees that tackle malware in support of our clients. The successful intern will also develop useful tools and processes that augment the capabilities of the FLARE team. This team is flooded with requests to analyze malware to support investigations, client requests, and detection.
This project will provide interns an opportunity to work on a critical software component used across the company. The goals and objectives of this project are to support the FLARE team by researching and developing new tools and techniques to analyze.
_All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, sexual orientation, gender identity, national origin, protected veteran status, or on the basis of disability. _