Malware Reverse Engineer, Junior

Key Role:

Support day-to-day operations focused on building a next generation automated malware analysis system. Apply advanced consulting and extensive technical expertise as well as full industry knowledge to develop innovative solutions to complex problems. Engage with multiple functional groups to comprehend client challenges, prototype new ideas and new technologies, and help to create solutions to drive the next wave of innovation. Analyze forensic, event, and signature data and binary, mobile, and executable code to detect a variety of threat types, including malware and advanced persistent threats. Perform analysis on captured volatile data, log data, and captured network traffic data to identify intrusion related artifacts in order to implement immediate defensive countermeasures.

Basic Qualifications:

  • 2+ years of experience in reverse engineering
  • Experience with C, Python, and JavaScript
  • Experience with disassembly tools and functional exploits, the creation of custom shellcode, code to bypass typical security measures, and ring 0 programming
  • TS/SCI clearance with a polygraph
  • BA or BS degree in CS, Computer Engineering, or Information Systems or 6+ years of experience in malware reverse engineering in lieu of a degree

Additional Qualifications:

  • Experience with techniques used in kill chain analysis
  • Ability to use static and dynamic tools and techniques to analyze and reverse-engineer malware

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance with polygraph is required.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.


Not ready to apply? Join our talent community and sign up for job alerts.