logo inner

Malware Reverse Engineer

LocationWashington D.c., United States
TypeOnsite

Who We’re Looking For (Position Overview):


We’re looking for a Malware Reverse Engineer to perform advanced malware analysis and reverse engineering to determine maliciousness, capabilities, complexity, and attribution-relevant indicators. This role supports mission needs including identifying C2 infrastructure, extracting IOCs, and producing defensible analysis outputs that can support investigative and legal processes.The ideal candidate is a deeply technical reverse engineer who can work independently on hard problems, rapidly learn unfamiliar techniques, and communicate complex behavior and conclusions in plain language.

What Your Day-To-Day Looks Like (Position Responsibilities):


  • Malware Analysis & Reverse Engineering
  • Conduct static and dynamic analysis of binaries and scripts; reverse engineer across architectures (x86/x64, ARM/ARM64, MIPS, others as needed).
  • Analyze packed/obfuscated/encrypted code; build unpacking/decryption routines where required. 
  • Tooling & Tradecraft
  • Use tools such as IDA Pro, Ghidra, Binary Ninja, WinDbg, x64dbg, and related debuggers/disassemblers. 
  • Detection Engineering Outputs
  • Extract IOCs; develop YARA rules and behavioral signatures to support detection and mitigation.
  • Identify persistence mechanisms, anti-analysis, and C2 protocols; assess multi-platform malware (Windows, Linux, macOS, mobile, embedded/IoT). 
  • Documentation, Briefing & Testimony Readiness
  • Produce thorough documentation of findings and conclusions; communicate clearly to non-expert audiences.
  • Successfully complete a mock examination and defend results in a practical courtroom exercise (Government-run). 
  • Operational Support
  • Support taskings that may require extended/irregular hours and location-specific needs depending on operational investigative activity. 

What You Need to Succeed (Minimum Requirements):


  • Citizenship & Clearance
  • U.S. Citizenship required.
  • Active TS clearance with SCI eligibility required. 
  • Reverse Engineering Expertise
  • Demonstrated hands-on experience with advanced malware reverse engineering across architectures and platforms.
  • Independence & Problem Solving
  • Ability to work independently on complex problems without higher-tier escalation support; self-directed research and rapid learning.

Ideally, You Also Have (Preferred Qualifications):


  • Proficiency in Python/PowerShell/Bash; additional experience in C/C++, Go, or Rust. 
  • Familiarity with common malware families and threat actor TTPs; experience building detection content (YARA, behavioral signatures).

We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.Apply for this job

Your tracker settings

We use cookies and similar methods to recognize visitors and remember their preferences. We also use them to measure ad campaign effectiveness, target ads and analyze site traffic. To learn more about these methods, including how to disable them, view our Cookie Policy or Privacy Policy.

By tapping `Accept`, you consent to the use of these methods by us and third parties. You can always change your tracker preferences by visiting our Cookie Policy.

logo innerThatStartupJob
Discover the best startup and their job positions, all in one place.
Copyright © 2025