Malware Reverse Engineer
Who Were Looking For (Position Overview):
Were looking for a Malware Reverse Engineer to perform advanced malware analysis and reverse engineering to determine maliciousness, capabilities, complexity, and attribution-relevant indicators. This role supports mission needs including identifying C2 infrastructure, extracting IOCs, and producing defensible analysis outputs that can support investigative and legal processes.
The ideal candidate is a deeply technical reverse engineer who can work independently on hard problems, rapidly learn unfamiliar techniques, and communicate complex behavior and conclusions in plain language.
What Your Day-To-Day Looks Like (Position Responsibilities):
- Malware Analysis & Reverse Engineering
- Conduct static and dynamic analysis of binaries and scripts; reverse engineer across architectures (x86/x64, ARM/ARM64, MIPS, others as needed).
- Analyze packed/obfuscated/encrypted code; build unpacking/decryption routines where required.
- Tooling & Tradecraft
- Use tools such as IDA Pro, Ghidra, Binary Ninja, WinDbg, x64dbg, and related debuggers/disassemblers.
- Detection Engineering Outputs
- Extract IOCs; develop YARA rules and behavioral signatures to support detection and mitigation.
- Identify persistence mechanisms, anti-analysis, and C2 protocols; assess multi-platform malware (Windows, Linux, macOS, mobile, embedded/IoT).
- Documentation, Briefing & Testimony Readiness
- Produce thorough documentation of findings and conclusions; communicate clearly to non-expert audiences.
- Successfully complete a mock examination and defend results in a practical courtroom exercise (Government-run).
- Operational Support
- Support taskings that may require extended/irregular hours and location-specific needs depending on operational investigative activity.
What You Need to Succeed (Minimum Requirements):
- Citizenship & Clearance
- U.S. Citizenship required.
- Active TS clearance with SCI eligibility required.
- Reverse Engineering Expertise
- Demonstrated hands-on experience with advanced malware reverse engineering across architectures and platforms.
- Independence & Problem Solving
- Ability to work independently on complex problems without higher-tier escalation support; self-directed research and rapid learning.
Ideally, You Also Have (Preferred Qualifications):
- Proficiency in Python/PowerShell/Bash; additional experience in C/C++, Go, or Rust.
- Familiarity with common malware families and threat actor TTPs; experience building detection content (YARA, behavioral signatures).

PIf7a2b86ac932-37437-39701667