CrawlJobs Logo

Malware Reverse Engineer, Senior

boozallen.com Logo

Booz Allen Hamilton

Location Icon

Location:
United States , Fort Meade

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

86900.00 - 198000.00 USD / Year

Job Description:

Do you enjoy the thrill of the hunt? Are you motivated by the head-to-head challenge of gaining access to well-protected networks? As a network exploitation professional, you know that understanding the adversaries’ tactics, techniques, and procedures are crucial to producing the intel that enables the success of mission owners. At Booz Allen, you can apply your vulnerability analysis, network mapping, exploitation, defensive, and IT logging process experience to execute offensive cyber operations that inform our nation’s most critical security missions. Safeguard the future with us and develop offensive cyber operations that are essential to providing national security for today and tomorrow.

Job Responsibility:

  • Apply vulnerability analysis, network mapping, exploitation, defensive, and IT logging process experience to execute offensive cyber operations
  • Develop offensive cyber operations that are essential to providing national security

Requirements:

  • Experience with using industry standard static and dynamic analysis tools, including disassemblers, debuggers, virtual machines, and hex editors
  • Experience in a scripting language such as Python or JavaScript
  • Experience with development or reverse engineering of Windows API targets
  • Experience with the identification and classification of malware families based on standard taxonomy and typical malware attack methodologies for both Windows and Linux
  • Knowledge of operating systems, including Windows, Linux, and Mac, application behaviors, and network traffic analysis to identify malware exploits
  • Experience with vulnerability research and exploitation methodologies such as fuzzing, shellcode, and leveraging memory corruption vulnerabilities
  • Ability to analyze shellcode, packed or obfuscated code, and the associated algorithms, and capture and interpret traces using Wireshark
  • Ability to read C/C++, C#, Go, Java, JavaScript, Python, or Rust
  • TS/SCI clearance with a polygraph
  • Bachelor's degree and 5+ years of experience in malware reverse engineering, or Master's degree and 3+ years of experience in malware reverse engineering

Nice to have:

  • Ability to read C/C++ and Python preferred
  • Master's degree in a related field
  • GREM Certification
  • OSED or OSEE Certification
What we offer:
  • Health, life, disability, financial, and retirement benefits
  • Paid leave
  • Professional development
  • Tuition assistance
  • Work-life programs
  • Dependent care
  • Recognition awards program

Additional Information:

Job Posted:
February 10, 2026

Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Malware Reverse Engineer, Senior

Senior Cyber Capability Developer

As a Senior Reverse Engineer / Cyber Capability Developer, you’ll play a pivotal...
Location
Location
United States , Clarksburg
Salary
Salary:
Not provided
imts.us Logo
Innovative Management & Technology Services
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Cybersecurity, Computer Science, Software Engineering, or a related field (or equivalent combination of education and experience)
  • 7+ years of experience in cybersecurity, software analysis, reverse engineering, or malware analysis
  • Proven ability to: Perform manual and automated static/dynamic analysis of both source code and binaries
  • Use tools like IDA Pro, Ghidra, Binary Ninja, Radare2, and SonarQube
  • Detect malicious logic, logic bombs, or zero-day threats in software artifacts
  • Deep understanding of secure coding principles, SDLC, and software vulnerability classes (e.g., buffer overflows, injection flaws)
  • Experience with multiple programming and scripting languages
  • Active Top Secret clearance is required
  • U.S. Citizenship is required
Job Responsibility
Job Responsibility
  • Conduct static analysis of source code in languages such as C, C++, Java, C#, Python, Groovy, JavaScript, Bash, PowerShell, and others
  • Perform dynamic, manual, and automated binary reverse engineering on compiled applications and unknown binaries to detect vulnerabilities or embedded malicious logic
  • Analyze firmware, hardware-level components, and known/unknown malware samples for behavioral patterns and exploit chains
  • Design and develop internal tools, frameworks, scripts, and application extensions to support efficient and repeatable software security assessments
  • Automate vulnerability scanning and integrate findings into secure development workflows
  • Provide technical guidance on secure software development methodologies, including secure web development techniques and defense against OWASP Top 10 vulnerabilities
  • Assess code libraries and frameworks against industry best practices and vulnerability databases
  • Collaborate with Information System Security Officers (ISSOs) and CJIS stakeholders to identify and mitigate risks, threats, and vulnerabilities
  • Deliver presentations, briefings, and knowledge transfer sessions to technical and non-technical audiences
  • Develop detailed technical reports and assessments, including risk reports, secure code reviews, and vulnerability findings
What we offer
What we offer
  • competitive compensation
  • excellent benefits including tuition reimbursement and employer-contributed 401K
  • referral bonuses
  • Fulltime
Read More
Arrow Right

Senior SOC Analyst

We are working with a leading UK IT solutions and managed services provider that...
Location
Location
United Kingdom
Salary
Salary:
50000.00 GBP / Year
dynamicsearch.co.uk Logo
Dynamic Search Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong background in SOC operations, digital forensics, incident response or threat detection
  • Experience leading complex security investigations and responding to high severity incidents
  • Advanced experience working with SIEM platforms, ideally Microsoft Sentinel and Defender XDR
  • Strong KQL knowledge for threat hunting and detection development
  • Experience using scripting languages such as Python or PowerShell for automation
  • Familiarity with digital forensics and investigation tools such as Velociraptor, KAPE or sandbox environments
  • Excellent written and verbal communication skills with the ability to present technical findings clearly
  • Comfortable mentoring junior team members and contributing to team development
Job Responsibility
Job Responsibility
  • Incident Response & Forensics: Lead complex security incidents from detection to remediation, coordinate containment, analyse attacker activity, and support client decision-making during high-severity events
  • Threat Hunting & Detection Engineering: Proactively hunt for threats using advanced KQL analytics, tune SIEM/EDR detections, and develop signatures aligned with MITRE ATT&CK
  • Malware Analysis & Reverse Engineering: Perform malware triage and behavioural analysis, using reverse-engineering tools when required
  • Client Reporting & Communication: Produce clear, high-quality investigation reports, timelines, and intelligence summaries for both technical and non-technical audiences
  • SOC Leadership & Continuous Improvement: Contribute to SOC playbooks, mentor junior analysts, support onboarding of new clients, and enhance processes and tooling
  • On-Call Support: Participate in the 24×7 on-call rota to provide expert support during critical incidents
What we offer
What we offer
  • Fully remote working across the UK
  • Competitive salary with additional benefits depending on experience
  • Opportunity to work within a mature and well supported Security Operations environment
  • Ongoing professional development and training opportunities
  • Exposure to a wide range of client environments and security challenges
  • Supportive culture with a strong focus on collaboration and continuous improvement
  • Fulltime
Read More
Arrow Right

Senior Security Researcher - Linux & API Security EDR

Are you an innovative security researcher with a deep understanding of Linux sys...
Location
Location
Israel , Tel Aviv
Salary
Salary:
Not provided
paloaltonetworks.com Logo
Palo Alto Networks
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4+ years of overall experience in cybersecurity research, with a proven track record of impactful projects
  • In-depth knowledge of operating system internals, including user and kernel space
  • Proficiency in programming languages like Python, C, and/or C++, with a strong understanding of system-level programming and APIs
  • Strong knowledge of the cyber threat landscape, modern malware techniques, and APTs
  • Hands-on experience with real-world threat hunting, big-data cyber research, incident response, or detection engineering
  • Excellent problem-solving skills and a passion for cybersecurity innovation
  • Ability to work independently, take initiative, and collaborate effectively within a team
Job Responsibility
Job Responsibility
  • Playing a pivotal role in shaping the future of our security solutions
  • Enhance the effectiveness of our product by designing cutting-edge protection components and developing sophisticated detection rules
  • Research Linux OS internals, Virtualized environments, and low-level system behaviors to inform and enhance our attack prevention mechanisms
  • Investigate and develop innovative methods for detecting threats and securing APIs, ensuring robust protection for modern applications and cloud-native environments
  • Apply sophisticated AI and big data approaches to investigate and research large amounts of data across our clients
  • Research and lead novel protection ideas to a production-grade level, serving as a subject matter expert
  • Stay up to date with the latest attacker methodologies, APT campaigns, and TTPs targeting Linux systems and APIs
  • Conduct static and dynamic reverse engineering of Linux malware to uncover new techniques and develop corresponding mitigation strategies
  • Work closely with engineering, product management, and other research teams to translate research findings into production-grade features
Read More
Arrow Right

Senior Threat Emulation Team Member

As a senior member of the Threat Emulation team within Admiral’s Cyber Security ...
Location
Location
Salary
Salary:
Not provided
admiralgroup.co.uk Logo
Admiral Group Plc
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ Years of delivering offensive security exercises
  • Highly responsive and proven professionalism in communication, interpersonal, analytical, and organizational skills
  • Experience of being a technical lead on security testing engagements
  • A strong technical background is required with in-depth experience in several of the following areas: CI/CD Pipelines/DevOps
  • Cloud and Cloud Security (Specifically Azure and GCP)
  • LLM Security Considerations
  • Applications of AI in Offensive Security
  • Scenario/objective based Penetration Testing/Red Teaming
  • Purple Teaming
  • Microsoft AD, Entra and In-Tune
Job Responsibility
Job Responsibility
  • Owning the delivery of Threat Emulation services through the full lifecycle, including taking responsibility for delivery of key projects and workstreams through to completion
  • Proactively analyse business needs, research
  • recommend solutions and drive their adoption
  • Identifying key opportunities to provide current and new security testing services across the business
  • Developing novel and innovative capabilities within the team
  • Performing post exercise or incident reviews and proposing resolutions using their subject matter expertise
  • Act as a point of escalation for the team and wider cyber department
  • Mentor and develop team members and peers
  • Define, develop and improve procedures, and processes for the team and wider operations department
  • Publish reporting and communications to key stakeholders, including briefings, presentations, control group calls/updates
What we offer
What we offer
  • Everyone receives 33 days holiday (including bank holidays) when they join us, increasing the longer you stay with us, up to a maximum of 38 days (including bank holidays). You also have the option to buy or sell up to an additional five days of annual leave
  • Financial & Mortgage Advice
  • 24-Hour Ecare
  • Cycle to Work Scheme
  • Annual Holiday Allowance
  • Flexible Working
  • Simply Health
  • Private Health Cover
  • Critical Illness Cover
  • Eligible for up to £3,600 of free shares each year after one year of service
  • Fulltime
Read More
Arrow Right

Incident Response Senior Analyst

We are seeking a highly skilled and detail-oriented Cybersecurity Incident Respo...
Location
Location
United States , Salt Lake City
Salary
Salary:
Not provided
alterdomus.com Logo
Alter Domus
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree in computer science, information security, or related professional experience
  • Minimum of 1 to 3 years of experience in incident response, Security operation, threat management
  • Strong knowledge of SIEM, and SOAR environment
  • Hands-on experience with IDS/IPS, and endpoint protection platforms
  • Working knowledge of Azure Defender and AWS security suite (GuardDuty, Security Hub)
  • Knowledge of network device configurations and standards (Firewalls, Switches, NSGs)
  • Knowledge of common operating systems MacOS, Linux and Windows OS
  • Familiarity with malware analysis, reverse engineering, and forensic tools
  • Strong cross functional communication skills and the ability to work closely with internal teams & lead cyber incident remediation efforts
  • Familiarity with common security frameworks and standards, such as NIST
Job Responsibility
Job Responsibility
  • Respond to security incidents
  • Lead and manage alerts, investigate, contain, and eradicate the cyber threats
  • Conduct forensic investigations to identify the root cause of security breaches and recommend preventive measures
  • Participate in post-incident reviews to identify lessons learned
  • Coordinate with internal teams and external partners during incident containment, eradication, and recovery efforts
  • Monitor security information and event management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), and other tools for suspicious activity
  • Investigate and assess potential threats, vulnerabilities, and attack vectors
  • Create detailed incident reports, document findings, remediation steps, and lessons learned
  • Maintain and update incident response playbooks and processes
  • Participate in Tabletop exercise and incident response trainings for other stakeholders
What we offer
What we offer
  • Support for professional accreditations
  • Flexible arrangements, generous holidays, plus an additional day off for your birthday
  • Continuous mentoring along your career progression
  • Active sports, events and social committees across our offices
  • 24/7 support available from our Employee Assistance Program
  • The opportunity to invest in our growth and success through our Employee Share Plan
  • Plus additional local benefits depending on your location
Read More
Arrow Right

Embedded Developer, Senior

As a computer network operations (CNO) specialist, you know that embedded and ap...
Location
Location
United States , Annapolis Junction
Salary
Salary:
86900.00 - 198000.00 USD / Year
boozallen.com Logo
Booz Allen Hamilton
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years of experience with computer network operations capability development and engineering services, including defense and exploitation
  • Experience with advanced software development, analytic development, and DevOps techniques for malware variants, advancing crypt capabilities, and emerging unknown protocols
  • Experience gathering requirements, designing and developing approaches for product security and resilience, cryptographic solutions, and anti-forensic measures
  • Experience with indigenous and vendor proprietary protocols
  • Experience using automation and virtualization to deploy, maintain, and sustain capabilities, developing and executing strategies for countering or mitigating environmental challenges, security and policy constraints, and system and architecture limitations
  • Experience with designing, developing, debugging, and testing of embedded software, and performing requirements analysis to drive requirement specifications
  • Experience performing design reviews with team members and government stakeholders
  • Experience packaging embedded software products for release to government customers
  • TS/SCI clearance with a polygraph
  • Bachelor’s degree
Job Responsibility
Job Responsibility
  • Support full project lifecycles
  • Guide an agile team of professionals
  • Manage reverse engineering and vulnerability analysis on a range of software problems
  • Inform operational parameters for complex systems
  • Leverage artificial intelligence and machine learning to influence the delivery of your work
  • Determine what the art of the possible is and what can be done—and then bring it to life for your clients
What we offer
What we offer
  • Health, life, disability, financial, and retirement benefits
  • Paid leave
  • Professional development
  • Tuition assistance
  • Work-life programs
  • Dependent care
  • Recognition awards program
Read More
Arrow Right

Exploitation Analyst, Senior

As a computer network operations (CNO) specialist, you know that embedded applic...
Location
Location
United States , Annapolis Junction
Salary
Salary:
112800.00 - 257000.00 USD / Year
boozallen.com Logo
Booz Allen Hamilton
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 8+ years of experience with computer network operations capability development and engineering services, including defense and exploitation to gain strategic advantages
  • Experience with leading-edge principles, theories, and concepts
  • Experience with advanced software development, analytic development, and DevOps techniques for malware variants, advancing crypt capabilities, and emerging unknown protocols
  • Experience gathering requirements and designing and developing approaches for product security and resilience cryptographic solutions and anti-forensic measures
  • Experience with indigenous and vendor proprietary protocols
  • Experience using automation and virtualization to deploy, maintain, and sustain capabilities and developing and executing strategies for countering or mitigating environmental challenges, security and policy constraints, and system or architecture limitations
  • TS/SCI clearance with a polygraph
  • Bachelor’s degree
Job Responsibility
Job Responsibility
  • Support full project lifecycles
  • Guide an agile team of professionals
  • Manage reverse engineering and vulnerability analysis on a range of software problems
  • Inform operational parameters for complex systems
  • Leverage artificial intelligence and machine learning to influence the delivery of your work
  • Determine what the art of the possible is and what can be done—and then bring it to life for your clients
  • Help combat the most advanced adversaries and defend national security
What we offer
What we offer
  • Health, life, disability, financial, and retirement benefits
  • Paid leave
  • Professional development
  • Tuition assistance
  • Work-life programs
  • Dependent care
  • Recognition awards program
Read More
Arrow Right

Senior Kernel Software Developer

We are seeking a Windows Kernel Driver Engineer with extensive experience in fil...
Location
Location
United States , Orlando
Salary
Salary:
Not provided
threatlocker.com Logo
ThreatLocker
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of hands-on experience writing Windows kernel-mode drivers, particularly filter drivers
  • Expert knowledge of Windows system internals (memory management, I/O subsystem, object manager, etc.)
  • Proficiency in C/C++, Windows Driver Kit (WDK), and kernel debugging tools
  • Experience in the cybersecurity domain, especially endpoint protection, EDR, anti-malware, or kernel-level monitoring
  • Solid understanding of code injection techniques, hooking, kernel-mode exploits, and mitigation strategies
  • Strong problem-solving skills and a security-first engineering mindset
Job Responsibility
Job Responsibility
  • Design and develop kernel-mode filter drivers (file system minifilter, registry filter, network filter, etc.) to support security monitoring and enforcement
  • Investigate and reverse-engineer Windows internals to implement low-level security features and bypass-resistant protections
  • Collaborate with the threat research, detection, and user-mode engineering teams to develop scalable and stealthy security solutions
  • Perform in-depth kernel debugging, crash dump analysis, and performance tuning using WinDbg, ETW, and related tools
  • Develop robust, secure, and maintainable driver code that meets Microsoft's signing and certification standards
  • Monitor Windows platform changes to ensure compatibility and stability across OS versions
Read More
Arrow Right