CrawlJobs Logo

Malware Researcher

jfrog.com Logo

JFrog

Location Icon

Location:
Israel , Netanya/Tel Aviv

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

At JFrog, we’re reinventing DevOps to help the world’s greatest companies innovate. JFrog Security is one of the main pillars of the JFrog offering and long term strategy. We are pushing the boundaries of security analysis of both binaries and code, shifting left and bringing new and exciting features to both developers and DevOps. We are looking for an experienced malware researcher to join the team. As a Malware Researcher at JFrog, you will perform research on source code, compiled code, and various software supply chain attacks. The position requires proven experience in security nomenclature and an understanding of both high-level and low-level attacks.

Job Responsibility:

  • Research malicious code in public repositories from various coding languages and technologies
  • Define and implement ways to automatically detect malicious code in open source software
  • Write technical reports and outward-facing publications regarding all research subjects mentioned above

Requirements:

  • 3+ years malware research experience in any of the following languages: Native code (C, C++), .NET (C# etc), Python, Node.JS, Java, Go
  • Experience in writing technical reports
  • Programming experience in Python

Nice to have:

  • Binary reverse engineering experience
  • DevOps experience

Additional Information:

Job Posted:
March 05, 2026

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Malware Researcher

Threat Intelligence Research Engineer

We’re looking for a Threat Intelligence Research Engineer who can bridge two wor...
Location
Location
United States , Orlando
Salary
Salary:
Not provided
threatlocker.com Logo
ThreatLocker
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years in cybersecurity research, threat intelligence, security engineering, SOC analysis, or malware analysis
  • Strong knowledge of attacker TTPs, MITRE ATT&CK, malware behavior, incident response, and threat hunting workflows
  • Hands-on familiarity with tools such as SIEMs, sandboxes, EDR platforms, packet analyzers, and OSINT frameworks
  • Ability to read logs, investigate incidents, and interpret technical artifacts
  • Proven experience writing technical reports, threat advisories, security research, or cybersecurity analysis
  • Ability to translate complex material into clear, concise content without losing technical accuracy
  • Strong editorial judgment and an understanding of narrative clarity and structure
  • Deep curiosity and a research-driven mindset
  • Commitment to accuracy, integrity, and evidence-backed analysis
  • Ability to juggle multiple research topics while meeting publishing deadlines
Job Responsibility
Job Responsibility
  • Monitor, analyze, and report on emerging threats, indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs), and global threat trends
  • Investigate vulnerabilities, misconfigurations, malware behavior, ransomware campaigns, and exploit chains
  • Conduct independent research on threat actors, intrusion patterns, and security gaps relevant to our customer base
  • Collaborate with internal engineering, SOC, and threat teams to access proprietary intelligence and validate findings
  • Produce clear, defensible, and high-accuracy analysis based on data and technical evidence
  • Transform threat research into high-quality reports, whitepapers, blogs, briefs, advisories, and thought-leadership content
  • Write in a way that resonates with cybersecurity professionals, executives, and IT leaders
  • Contribute to articles under the names of internal subject matter experts (SMEs) to elevate their voices and strengthen company authority
  • Develop clear visuals, diagrams, and technical explanations to support complex research
  • Ensure all content is technically rigorous, original, and aligned with our Zero Trust security philosophy
Read More
Arrow Right

Malware Reverse Engineer, Senior

Do you enjoy the thrill of the hunt? Are you motivated by the head-to-head chall...
Location
Location
United States , Fort Meade
Salary
Salary:
86900.00 - 198000.00 USD / Year
boozallen.com Logo
Booz Allen Hamilton
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience with using industry standard static and dynamic analysis tools, including disassemblers, debuggers, virtual machines, and hex editors
  • Experience in a scripting language such as Python or JavaScript
  • Experience with development or reverse engineering of Windows API targets
  • Experience with the identification and classification of malware families based on standard taxonomy and typical malware attack methodologies for both Windows and Linux
  • Knowledge of operating systems, including Windows, Linux, and Mac, application behaviors, and network traffic analysis to identify malware exploits
  • Experience with vulnerability research and exploitation methodologies such as fuzzing, shellcode, and leveraging memory corruption vulnerabilities
  • Ability to analyze shellcode, packed or obfuscated code, and the associated algorithms, and capture and interpret traces using Wireshark
  • Ability to read C/C++, C#, Go, Java, JavaScript, Python, or Rust
  • TS/SCI clearance with a polygraph
  • Bachelor's degree and 5+ years of experience in malware reverse engineering, or Master's degree and 3+ years of experience in malware reverse engineering
Job Responsibility
Job Responsibility
  • Apply vulnerability analysis, network mapping, exploitation, defensive, and IT logging process experience to execute offensive cyber operations
  • Develop offensive cyber operations that are essential to providing national security
What we offer
What we offer
  • Health, life, disability, financial, and retirement benefits
  • Paid leave
  • Professional development
  • Tuition assistance
  • Work-life programs
  • Dependent care
  • Recognition awards program
Read More
Arrow Right

Threat Analyst

Socket is looking for a Threat Analyst to join our growing Threat Research Team....
Location
Location
United States
Salary
Salary:
115000.00 - 150000.00 USD / Year
socket.dev Logo
Socket
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of work experience and a master’s degree in computer science, engineering, or a related field (or equivalent experience)
  • Technical experience across several areas of security operations, including investigations, incident response and management, digital forensics, malware analysis, reverse engineering, threat intelligence, threat hunting, and detection engineering
  • Excellent communication skills and the ability to assess the relevance and impact of threats
  • Experience building tools for automation, data collection, and threat hunting
  • Passion for open source and code
Job Responsibility
Job Responsibility
  • Analyze numerous unique threats daily, maintaining a standard of quality that sets the industry benchmark for supply chain security
  • Author high-impact technical blog posts on malicious open source code packages and extensions, and publish deep-dive research pieces on malicious campaigns, threat actor profiles, novel attack vectors, and ecosystem-wide trends
  • Design and build automated scripts and tools to streamline malware analysis, enhancing our data collection, threat analysis, and threat hunting workflows
  • Partner with our engineering team to integrate your research into our core product, turning manual insights into scalable, real-time protection
  • Leverage expertise in open source software ecosystems to enhance security across package registries, browser extensions (Chrome/VS Code), and proactively monitor GitHub/GitLab for emerging malicious campaigns
  • Track APT (Advanced Persistent Threat) adversaries, characterizing various TTPs (Tactics, Techniques, and Procedures), capabilities, infrastructure, and campaigns
What we offer
What we offer
  • Equity
  • Health insurance
  • Vacation time
  • Holidays
  • Paid parental leave
  • Market competitive salary bands
  • Meaningful equity program
  • Comprehensive health benefits for you and your family
  • Flexible time-off, holidays, and winter shutdown to rest & recharge
  • Paid parental leave
  • Fulltime
Read More
Arrow Right

Threat Intelligence Researcher (Cloud)

We're looking for a Threat Intelligence Researcher (Cloud) to join the Threat Re...
Location
Location
United States , New York City
Salary
Salary:
160000.00 - 220000.00 USD / Year
wiz.io Logo
Wiz
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in security or threat research, with a proven track record of tracking sophisticated threat actors
  • Ability to find novel and durable ways of identifying and tracking threat actors across multiple data sets
  • Experience working with large-scale telemetry, especially infrastructure hunting and by pivoting through query languages and scripting
  • Familiarity with malware analysis and using YARA to hunt for malware
  • Willingness to take on multiple roles to build out actor tracking
Job Responsibility
Job Responsibility
  • Identify, analyze, and track advanced state-backed and financially motivated attackers that target cloud ecosystems
  • Hunt through a wide range of data sources to identify malicious campaigns targeting Wiz customers
  • Leverage open and closed-data to track the infrastructure and malware used by advanced actors
  • Investigate and attribute incidents, campaigns, and threat actors to understand more about the attackers and what motivates them
  • Communicate novel findings to multiple audiences, including customers and the public
What we offer
What we offer
  • Medical, dental and vision insurance
  • Home Office Setup reimbursement
  • Flexible Spending Accounts
  • Monthly Connectivity reimbursement
  • Employee Assistance Program (EAP)
  • Short- and Long-term Disability Insurance
  • Life & Accident Insurance
  • 401(k) Retirement Savings Plan (with employer match)
  • Flexible paid time off + 11 paid holidays
  • Paid leave programs, including parental, pregnancy health, medical and bereavement leave
  • Fulltime
Read More
Arrow Right

Security Research Intern

As a Security Research Intern, under supervision you will design and conduct sec...
Location
Location
India , Multiple Locations
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Currently pursuing a Bachelor's Degree in Statistics, Mathematics, Computer Science or related field
  • Must have at least one additional quarter/semester of school remaining following the completion of the internship
Job Responsibility
Job Responsibility
  • Begin to analyze threat trends and anomalies to determine operational impact
  • Determine vectors that introduce threat and potential mitigation strategies
  • Learn about systemic security issues and how to address them
  • Process threat reporting from internal and external sources
  • Provide discrete threat data based on intelligence requirements or customer requests
  • Identify security defects or vulnerabilities and deficiencies in security guidance
  • Contribute code to technical implementation and automation of solutions to address security issues
  • Use results from research and experimentation to support architecture or product direction
  • Identify areas of dependency and overlap with other teams or team members
  • Provide constructive input so the work is integrated and timely
Read More
Arrow Right

Security Operations Analyst

As a Security Operations Analyst within our Information Security Team you will p...
Location
Location
Portugal , Lisbon; Oporto; Barcelona; Madrid; Flexible
Salary
Salary:
Not provided
https://www.tui.com Logo
TUI
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Demonstrable deep experience of design and build of systems integration, ideally in a security operations environment
  • Strong technical and IT operations background
  • Experience with Splunk or similar SIEM platforms, Service Desk systems, and security monitoring tools
  • Familiarity with Windows, macOS, Linux, and Unix operating systems
  • Computer networking and cloud technology fundamentals
  • Understanding of Active Directory, LDAP, IDaaS (AAD)
  • Rudimentary security knowledge of firewalls, proxies, antivirus, and IPS/IDS concepts
  • Experience scripting in Python or PowerShell
  • Experience using Microsoft Excel and Word
  • Excellent written and verbal communication skills
Job Responsibility
Job Responsibility
  • Monitor for alerts from security tools
  • Triage security alerts
  • Use network and host security tooling to perform additional investigation
  • Work the full incident lifecycle from detection, investigation, response, to remediation for security alerts
  • Contribute to the further development, maintenance, and standardization of SOC processes, policies, and procedures
  • Work with other IT/security teams to identify areas for improvement around detection, investigation, and response
  • Research common and topical commodity and APT-based malware tactics and techniques
  • Provide feedback on detection rules to help tune security tools and minimize false positives
  • Participate in SOC working groups and sub-teams to help generate and execute on new ideas for content, technology advancements, and proactive defence improvement projects
What we offer
What we offer
  • Attractive remuneration
  • Bonus opportunity
  • Exclusive travel perks & discounts
  • Extensive health & wellbeing support
  • Flexible working models
  • Opportunities to upskill, reskill and grow your career
  • Access to TUI Tech Learning Hub
  • Participation in tech communities and collaboration on global projects and teams
  • Involvement in local charity and sustainability initiatives
  • Fulltime
Read More
Arrow Right

Security Operations Analyst

As a Security Operations Analyst within our Information Security Team you will p...
Location
Location
Portugal , Lisbon; Oporto; Barcelona; Madrid; Flexible
Salary
Salary:
Not provided
https://www.tui.com Logo
TUI
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Demonstrable deep experience of design and build of systems integration, ideally in a security operations environment
  • Strong technical and IT operations background
  • Experience of working with Splunk or similar SIEM platforms, Service Desk systems and security monitoring tools
  • Familiarity and experience with Windows, macOS, Linux, and Unix operating systems
  • Computer networking and cloud technology fundamentals
  • Understanding of Active Directory, LDAP, IDaaS (AAD)
  • Rudimentary security knowledge and awareness of firewalls, proxies, antivirus, and IPS/IDS concepts
  • Experience scripting in Python or PowerShell
  • Experience using Microsoft Excel and Word
  • Excellent written and verbal communication skills
Job Responsibility
Job Responsibility
  • Monitor for alerts from security tools
  • Triage security alerts
  • Use network and host security tooling to perform additional investigation
  • Work the full incident lifecycle from detection, investigation, response, to remediation for security alerts
  • Contribute to the further development, maintenance, and standardization of SOC processes, policies, and procedures
  • Work with other IT/security teams to identify areas for improvement around detection, investigation, and response
  • Research common and topical commodity and APT-based malware tactics and techniques in preparation for future attacks
  • Provide feedback on detection rules to help tune security tools and minimize false positives
  • Participate in SOC working groups and sub-teams to help generate and execute on new ideas for content, technology advancements, and proactive defence improvement projects
What we offer
What we offer
  • Attractive remuneration
  • Bonus opportunity
  • Exclusive travel perks & discounts
  • Extensive health & wellbeing support
  • Flexible working
  • Opportunities to upskill, reskill and grow your career
  • Access the TUI Tech Learning Hub
  • Participate in tech communities and collaborate on global projects and teams
  • Get involved with local charity and sustainability initiatives
  • Fulltime
Read More
Arrow Right

Security Operations Analyst

As a Security Operations Analyst within our Information Security Team you will p...
Location
Location
Portugal , Lisbon
Salary
Salary:
Not provided
https://www.tui.com Logo
TUI
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Demonstrable deep experience of design and build of systems integration, ideally in a security operations environment
  • strong technical and IT operations background, with strong experience
  • experience of working with Splunk or similar SIEM platforms, Service Desk systems and security monitoring tools desirable with experience in designing and developing these platforms
  • familiarity and experience with Windows, macOS, Linux, and Unix operating systems
  • computer networking and cloud technology fundamentals
  • understanding of Active Directory, LDAP, IDaaS (AAD)
  • rudimentary security knowledge and awareness of firewalls, proxies, antivirus, and IPS/IDS concepts
  • experience scripting in Python or PowerShell
  • experience using Microsoft Excel and Word
  • excellent written and verbal communication skills
Job Responsibility
Job Responsibility
  • Promote a security first culture at TUI
  • work with resolver teams to ensure that information security events and incidents are automatically generated, appropriately addressed and closed in local ticketing systems and ensure reporting on key performance indicators and service levels
  • adopt a pragmatic and ‘can-do’ attitude in everything you do, partnering with your colleagues across the TUI businesses and IT functions worldwide
  • build strong working relationships and influence others to do the right thing to Protect our Smile
  • monitor for alerts from security tools, including, but not limited to, security analytics platforms, automation tools, ticket management systems, user-reported alerts, and others
  • triage security alerts, including initial analysis to determine the validity of alerts and gather additional context
  • use network and host security tooling to perform additional investigation
  • work the full incident lifecycle from detection, investigation, response, to remediation for security alerts
  • contribute to the further development, maintenance, and standardization of SOC processes, policies, and procedures
  • work with other IT/security teams to identify areas for improvement around detection, investigation, and response
What we offer
What we offer
  • Attractive remuneration, bonus opportunity, exclusive travel perks & discounts, extensive health & wellbeing support, and more
  • flexible working: Work is something you do, not somewhere you go. We encourage a healthy work-life balance and offer hybrid or remote working models
  • opportunities to upskill, reskill and grow your career
  • access the TUI Tech Learning Hub to level-up and reach your ambitions
  • participate in our tech communities and collaborate on global projects and teams
  • get involved with incredible local charity and sustainability initiatives like the TUI Care Foundation and the Sustainable Tech Community.
  • Fulltime
Read More
Arrow Right