Malware Reverse Engineer

Python, Ethical Hacking, Security, Malware
Full Time
$100,000 - $110,000
Work from home not available Travel not required

Job Description


Malware Reverse Engineer

We are seeking an experienced Malware Analyst/Reverse Engineer to perform malware analysis and reverse engineering in support of incident response, investigative analysis, threat hunting, and research on existing and emerging cyber threats. The role will involve in-depth analysis of static and behavioral analysis of complex malicious code utilizing various tools, including disassemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers. The candidate will perform the functions of malware analyst/reverse engineer and serve as a liaison for Threat Services for the Global Fusion Center, and mentor and collaborate with the threat hunting, incident handling/response, and forensics teams.


  • Bachelors and/or Masters Degree in Engineering,
  • 5+ years overall technical experience in either reverse engineering/malware analysis, threat intelligence, incident response, security operations, or related information security field.
  • 5+ years experience in application design/engineering, including but not limited to programming/scripting, Windows/Linux system administration, RDBMS/NoSQL database administration, etc.
  • 2+ years experience in penetration testing or ethical hacking
  • 2+ years experience with reverse engineering tools like IDA Pro, Ghidra, OllyDbg, Windbg, and Wireshark.
  • 2+ years experience of Python scripting to automate analysis and reverse engineering tasks (and Bash or Powershell or Perl C/C++).
  • 2+ years experience of x86, ARM, and x64 architectures.
  • Ability to reverse engineer binaries of various types including: x86, x64, C, C++, and .NET.
  • Strong understanding of Windows Operating System Internals, Windows APIs, and writing and analyzing DLLs.
  • Recent experience developing custom software and hardware tools to assist in performing reverse engineering and vulnerability analysis.
  • Strong understanding of common network and application stack protocols, including but not limited to TCP/IP, SMTP, DNS, TLS, XML, HTTP, etc.
  • Experience with security operations tools, including but not limited to:
    • SIEM (e.g. Splunk, ArcSight)
    • Indicatr management (e.g. ThreatConnect)
    • Link/relatinship analysis (e.g. Maltego, IBM i2 Analyst Notebook)
    • Signature develpment/management (e.g. Snort rules, Yara rules)

    Posted By

    Robyn Honquest

    Dice Id : napil006
    Position Id : 6172055
    Originally Posted : 4 months ago
    Have a Job? Post it

    Similar Positions

    Lvl 2 SOC Analyst
    • Request Technology, LLC
    • Charlotte, NC
    SOC Analyst Level 3
    • Peterson Technology Partners
    • Charlotte, NC
    Security Operations Center (SOC) Analyst Level 2
    • Metasys Technologies
    • Charlotte, NC
    Security Operations Center Level 3 Analyst
    • Allstate Insurance Company
    • Charlotte, Nc
    Security Engineer
    • Charlotte, NC
    Remote Malware Reverse Engineer Lead
    • The Judge Group, Inc.
    • Charlotte, NC
    Azure Security Engineer - 100% REMOTE
    • Nigel Frank International
    • Charlotte, NC
    Nagios Engineer
    • Kforce Technology Staffing
    • Charlotte, NC
    Cyber Security Trainer
    • SkillStorm
    • Charlotte, NC
    Security Resource
    • Professional Business Services Intl.
    • Fort Mill, SC
    Information Security Architect
    • Zenmonics
    • Charlotte, NC
    Splunk Developer - Detroit, MI/ Charlotte, NC
    • Digital Technology Solutions
    • Charlotte, NC
    Trend Micro Engineer
    • Genpact LLC
    • Salisbury, NC