Research, analyze, and reverse-engineer malicious code to produce detections, mitigation guidance, and threat intelligence for enterprise protection.
Responsibilities
- Analyze samples (static/dynamic) to determine behavior, persistence, and indicators of compromise.
- Develop signatures, YARA rules, and detection content for endpoint and network tools.
- Produce concise technical reports and IOC packages for incident response teams.
- Feed findings into threat intelligence and help improve defensive controls.
Required
- 3+ years in malware analysis, incident response, or threat research.
- Comfortable with reverse-engineering tools and analysis workflows (no requirement to author malicious tools).
- Strong Windows and/or Linux internals knowledge and scripting ability (Python, PowerShell, etc.).
- Degree in relevant field or equivalent experience.
Desired
- Experience with sandboxing platforms, YARA, and public threat intelligence platforms.
- Certification such as GIAC Reverse Engineering Malware (GREM) is a plus.
Ethics
Role is strictly defensively focused; all analysis conducted for protection, detection, and lawful response.
Job Type: Full-time
Work Location: In person