Malware Reverse Engineer
Sprymethods
Posted: January 29, 2026
Interested in this position?
Create a free account to apply with AI-powered matching
Required Skills
Job Description
Who We’re Looking For (Position Overview):
We’re looking for a Malware Reverse Engineer to perform advanced malware analysis and reverse engineering to determine maliciousness, capabilities, complexity, and attribution-relevant indicators. This role supports mission needs including identifying C2 infrastructure, extracting IOCs, and producing defensible analysis outputs that can support investigative and legal processes.
The ideal candidate is a deeply technical reverse engineer who can work independently on hard problems, rapidly learn unfamiliar techniques, and communicate complex behavior and conclusions in plain language.
What Your Day-To-Day Looks Like (Position Responsibilities)::
• Malware Analysis & Reverse Engineering
• Conduct static and dynamic analysis of binaries and scripts; reverse engineer across architectures (x86/x64, ARM/ARM64, MIPS, others as needed).
• Analyze packed/obfuscated/encrypted code; build unpacking/decryption routines where required.
• Tooling & Tradecraft
• Use tools such as IDA Pro, Ghidra, Binary Ninja, WinDbg, x64dbg, and related debuggers/disassemblers.
• Detection Engineering Outputs
• Extract IOCs; develop YARA rules and behavioral signatures to support detection and mitigation.
• Identify persistence mechanisms, anti-analysis, and C2 protocols; assess multi-platform malware (Windows, Linux, macOS, mobile, embedded/IoT).
• Documentation, Briefing & Testimony Readiness
• Produce thorough documentation of findings and conclusions; communicate clearly to non-expert audiences.
• Successfully complete a mock examination and defend results in a practical courtroom exercise (Government-run).
• Operational Support
• Support taskings that may require extended/irregular hours and location-specific needs depending on operational investigative activity.
What You Need to Succeed (Minimum Requirements)::
• Citizenship & Clearance
• U.S. Citizenship required.
• Active TS clearance with SCI eligibility required.
• Reverse Engineering Expertise
• Demonstrated hands-on experience with advanced malware reverse engineering across architectures and platforms.
• Independence & Problem Solving
• Ability to work independently on complex problems without higher-tier escalation support; self-directed research and rapid learning.
Ideally, You Also Have (Preferred Qualifications)::
• Proficiency in Python/PowerShell/Bash; additional experience in C/C++, Go, or Rust.
• Familiarity with common malware families and threat actor TTPs; experience building detection content (YARA, behavioral signatures).