Malware Reverse Engineer

Spry MethodsWashington, DC
4d

About The Position

We’re looking for a Malware Reverse Engineer to perform advanced malware analysis and reverse engineering to determine maliciousness, capabilities, complexity, and attribution-relevant indicators. This role supports mission needs including identifying C2 infrastructure, extracting IOCs, and producing defensible analysis outputs that can support investigative and legal processes. The ideal candidate is a deeply technical reverse engineer who can work independently on hard problems, rapidly learn unfamiliar techniques, and communicate complex behavior and conclusions in plain language.

Requirements

  • U.S. Citizenship required.
  • Active TS clearance with SCI eligibility required.
  • Demonstrated hands-on experience with advanced malware reverse engineering across architectures and platforms.
  • Ability to work independently on complex problems without higher-tier escalation support; self-directed research and rapid learning.

Nice To Haves

  • Proficiency in Python/PowerShell/Bash; additional experience in C/C++, Go, or Rust.
  • Familiarity with common malware families and threat actor TTPs; experience building detection content (YARA, behavioral signatures).

Responsibilities

  • Malware Analysis & Reverse Engineering Conduct static and dynamic analysis of binaries and scripts; reverse engineer across architectures (x86/x64, ARM/ARM64, MIPS, others as needed). Analyze packed/obfuscated/encrypted code; build unpacking/decryption routines where required.
  • Tooling & Tradecraft Use tools such as IDA Pro, Ghidra, Binary Ninja, WinDbg, x64dbg, and related debuggers/disassemblers.
  • Detection Engineering Outputs Extract IOCs; develop YARA rules and behavioral signatures to support detection and mitigation. Identify persistence mechanisms, anti-analysis, and C2 protocols; assess multi-platform malware (Windows, Linux, macOS, mobile, embedded/IoT).
  • Documentation, Briefing & Testimony Readiness Produce thorough documentation of findings and conclusions; communicate clearly to non-expert audiences. Successfully complete a mock examination and defend results in a practical courtroom exercise (Government-run).
  • Operational Support Support taskings that may require extended/irregular hours and location-specific needs depending on operational investigative activity.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service