Hybrid Forensics Malware Analyst, Reverse Engineer

Posted 3 minutes ago

Apply now

About the role

  • Forensics Malware Analyst focused on reverse engineering malicious software and conducting forensic analysis. Collaborating with elite cyber teams on classified national security programs.

Responsibilities

  • Conduct static and dynamic malware analysis to determine functionality, intent, and impact
  • Perform reverse engineering of binaries to uncover persistence mechanisms, exploit behavior, and obfuscation techniques
  • Execute host-based and memory forensics on compromised systems
  • Analyze artifacts such as registry changes, file system modifications, memory dumps, and logs
  • Identify and document indicators of compromise (IOCs) and attack chains
  • Correlate forensic findings with threat intelligence and adversary TTPs
  • Develop scripts, tools, or automation to support malware and forensic analysis efforts
  • Produce clear, detailed technical reports and brief findings to stakeholders
  • Support incident response and post-exploitation analysis on classified networks
  • Stay current with emerging malware families, forensic methodologies, and reverse engineering tools

Requirements

  • Bachelor’s degree in Computer Science, Cybersecurity, Computer Engineering, or a related technical field (or equivalent experience)
  • Hands-on experience in malware analysis, reverse engineering, and/or digital forensics
  • Strong understanding of Windows and/or Linux internals
  • Proficiency with reverse engineering and forensic tools such as:
  • Ghidra, IDA Pro, Binary Ninja
  • x64dbg, WinDbg, Volatility, Autopsy
  • Experience with x86/x64 assembly and low-level debugging
  • Proficiency in scripting or programming (Python, C/C++, or similar)
  • Understanding of common malware techniques including packing, encryption, obfuscation, and anti-analysis methods
  • Ability to obtain and maintain a TS/SCI clearance.
  • Prior experience supporting DOD, Intelligence Community, or federal cyber programs
  • Experience with memory forensics and live response
  • Familiarity with network forensics and PCAP analysis
  • Experience analyzing APT or nation-state malware
  • Kernel-mode, firmware, or embedded system reverse engineering experience
  • Active TS/SCI clearance

Job title

Forensics Malware Analyst, Reverse Engineer

Job type

Experience level

Mid levelSenior

Salary

$120,000 - $150,000 per year

Degree requirement

Bachelor's Degree

Location requirements

Report this job

See something inaccurate? Let us know and we'll update the listing.

Report job