CrawlJobs Logo

Malware Reverse Engineer, Senior

boozallen.com Logo

Booz Allen Hamilton

Location Icon

Location:
United States , Fort Meade

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

86900.00 - 198000.00 USD / Year

Job Description:

Do you enjoy the thrill of the hunt? Are you motivated by the head-to-head challenge of gaining access to well-protected networks? As a network exploitation professional, you know that understanding the adversaries’ tactics, techniques, and procedures are crucial to producing the intel that enables the success of mission owners. At Booz Allen, you can apply your vulnerability analysis, network mapping, exploitation, defensive, and IT logging process experience to execute offensive cyber operations that inform our nation’s most critical security missions. Safeguard the future with us and develop offensive cyber operations that are essential to providing national security for today and tomorrow.

Job Responsibility:

  • Apply vulnerability analysis, network mapping, exploitation, defensive, and IT logging process experience to execute offensive cyber operations
  • Develop offensive cyber operations that are essential to providing national security

Requirements:

  • Experience with using industry standard static and dynamic analysis tools, including disassemblers, debuggers, virtual machines, and hex editors
  • Experience in a scripting language such as Python or JavaScript
  • Experience with development or reverse engineering of Windows API targets
  • Experience with the identification and classification of malware families based on standard taxonomy and typical malware attack methodologies for both Windows and Linux
  • Knowledge of operating systems, including Windows, Linux, and Mac, application behaviors, and network traffic analysis to identify malware exploits
  • Experience with vulnerability research and exploitation methodologies such as fuzzing, shellcode, and leveraging memory corruption vulnerabilities
  • Ability to analyze shellcode, packed or obfuscated code, and the associated algorithms, and capture and interpret traces using Wireshark
  • Ability to read C/C++, C#, Go, Java, JavaScript, Python, or Rust
  • TS/SCI clearance with a polygraph
  • Bachelor's degree and 5+ years of experience in malware reverse engineering, or Master's degree and 3+ years of experience in malware reverse engineering

Nice to have:

  • Ability to read C/C++ and Python preferred
  • Master's degree in a related field
  • GREM Certification
  • OSED or OSEE Certification
What we offer:
  • Health, life, disability, financial, and retirement benefits
  • Paid leave
  • Professional development
  • Tuition assistance
  • Work-life programs
  • Dependent care
  • Recognition awards program

Additional Information:

Job Posted:
February 10, 2026

Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Malware Reverse Engineer, Senior

Senior Cyber Capability Developer

As a Senior Reverse Engineer / Cyber Capability Developer, you’ll play a pivotal...
Location
Location
United States , Clarksburg
Salary
Salary:
Not provided
imts.us Logo
Innovative Management & Technology Services
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Cybersecurity, Computer Science, Software Engineering, or a related field (or equivalent combination of education and experience)
  • 7+ years of experience in cybersecurity, software analysis, reverse engineering, or malware analysis
  • Proven ability to: Perform manual and automated static/dynamic analysis of both source code and binaries
  • Use tools like IDA Pro, Ghidra, Binary Ninja, Radare2, and SonarQube
  • Detect malicious logic, logic bombs, or zero-day threats in software artifacts
  • Deep understanding of secure coding principles, SDLC, and software vulnerability classes (e.g., buffer overflows, injection flaws)
  • Experience with multiple programming and scripting languages
  • Active Top Secret clearance is required
  • U.S. Citizenship is required
Job Responsibility
Job Responsibility
  • Conduct static analysis of source code in languages such as C, C++, Java, C#, Python, Groovy, JavaScript, Bash, PowerShell, and others
  • Perform dynamic, manual, and automated binary reverse engineering on compiled applications and unknown binaries to detect vulnerabilities or embedded malicious logic
  • Analyze firmware, hardware-level components, and known/unknown malware samples for behavioral patterns and exploit chains
  • Design and develop internal tools, frameworks, scripts, and application extensions to support efficient and repeatable software security assessments
  • Automate vulnerability scanning and integrate findings into secure development workflows
  • Provide technical guidance on secure software development methodologies, including secure web development techniques and defense against OWASP Top 10 vulnerabilities
  • Assess code libraries and frameworks against industry best practices and vulnerability databases
  • Collaborate with Information System Security Officers (ISSOs) and CJIS stakeholders to identify and mitigate risks, threats, and vulnerabilities
  • Deliver presentations, briefings, and knowledge transfer sessions to technical and non-technical audiences
  • Develop detailed technical reports and assessments, including risk reports, secure code reviews, and vulnerability findings
What we offer
What we offer
  • competitive compensation
  • excellent benefits including tuition reimbursement and employer-contributed 401K
  • referral bonuses
  • Fulltime
Read More
Arrow Right

Senior Security Researcher

We are looking for a Security Researcher who thrives on both sides of the fence....
Location
Location
Israel , Tel Aviv
Salary
Salary:
Not provided
island.io Logo
Island
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in at least one of the following: security research, vulnerability research, malware analysis, threat intelligence, or detection engineering
  • Offensive security mindset with the ability to flip to the defensive side — finding attacks and building mitigations
  • Strong analytical skills — comfortable digging into unfamiliar code, protocols, or systems and figuring out how they break
  • Familiarity with operating system internals (Windows and/or macOS)
  • Hands-on experience with reverse engineering or dynamic/static analysis tools
  • Ability to write code for automation, tooling, and proof-of-concepts
  • Strong written and verbal communication — ability to write compelling research and present at conferences
Job Responsibility
Job Responsibility
  • Offensive Research: Discover new attack vectors, abuse patterns, and security gaps in browsers, web applications, OS internals, and enterprise workflows
  • Defensive Engineering: Design and implement detections, mitigations, and security policies informed by your offensive findings
  • close the loop from attack to protection
  • Vulnerability & Malware Analysis: Perform reverse engineering on malware, exploits, and obfuscated code across Windows, macOS, and browser environments
  • Web & Browser Security: Research techniques ranging from classic vulnerabilities (XSS, SSRF) to browser-specific primitives (extension abuse, DOM manipulation, same-origin bypasses)
  • Supply-Chain Security: Investigate threats in software supply chains, including browser extension marketplaces and package registries
  • Threat Intelligence: Correlate signals across multiple sources to identify malicious infrastructure and adversary TTPs
  • Public Impact: Write technical blog posts, publish research, and represent Island at major security conferences (Black Hat, DEF CON, etc.)
Read More
Arrow Right

Senior SOC Analyst

We are working with a leading UK IT solutions and managed services provider that...
Location
Location
United Kingdom
Salary
Salary:
50000.00 GBP / Year
dynamicsearch.co.uk Logo
Dynamic Search Solutions
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong background in SOC operations, digital forensics, incident response or threat detection
  • Experience leading complex security investigations and responding to high severity incidents
  • Advanced experience working with SIEM platforms, ideally Microsoft Sentinel and Defender XDR
  • Strong KQL knowledge for threat hunting and detection development
  • Experience using scripting languages such as Python or PowerShell for automation
  • Familiarity with digital forensics and investigation tools such as Velociraptor, KAPE or sandbox environments
  • Excellent written and verbal communication skills with the ability to present technical findings clearly
  • Comfortable mentoring junior team members and contributing to team development
Job Responsibility
Job Responsibility
  • Incident Response & Forensics: Lead complex security incidents from detection to remediation, coordinate containment, analyse attacker activity, and support client decision-making during high-severity events
  • Threat Hunting & Detection Engineering: Proactively hunt for threats using advanced KQL analytics, tune SIEM/EDR detections, and develop signatures aligned with MITRE ATT&CK
  • Malware Analysis & Reverse Engineering: Perform malware triage and behavioural analysis, using reverse-engineering tools when required
  • Client Reporting & Communication: Produce clear, high-quality investigation reports, timelines, and intelligence summaries for both technical and non-technical audiences
  • SOC Leadership & Continuous Improvement: Contribute to SOC playbooks, mentor junior analysts, support onboarding of new clients, and enhance processes and tooling
  • On-Call Support: Participate in the 24×7 on-call rota to provide expert support during critical incidents
What we offer
What we offer
  • Fully remote working across the UK
  • Competitive salary with additional benefits depending on experience
  • Opportunity to work within a mature and well supported Security Operations environment
  • Ongoing professional development and training opportunities
  • Exposure to a wide range of client environments and security challenges
  • Supportive culture with a strong focus on collaboration and continuous improvement
  • Fulltime
Read More
Arrow Right

Senior Investigator

Microsoft’s Digital Crimes Unit (DCU) has an immediate opening for a highly qual...
Location
Location
Belgium , Brussels
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s degree & demonstrable experience in cyber investigations, threat intelligence, or cyber defense operations
  • Willingness to provide expert witness testimony in court filings and proceedings that will be made public
  • Proficient with Microsoft SQL Server, KQL, Python, and/or other scripting languages
  • Proficient knowledge of malware analysis, malware reverse engineering, and behavioral malware analysis
  • Demonstrated ability to author clear, accurate, and highly technical investigative reports that translate complex technical findings into actionable insights for non-technical audiences, including legal, executive, and law enforcement stakeholders
  • Ability to meet Microsoft, customer, and/or government security screening requirements for this role (including specialized security screenings)
  • Microsoft Cloud Background Check: required upon hire/transfer and every two years thereafter
  • Collaborative, team-first mindset
  • Proficient written and verbal communication skills, including the ability to translate complex technical findings for a broad range of stakeholders (e.g., law enforcement, legal counsel, and executives)
Job Responsibility
Job Responsibility
  • Identify and analyze data sources to uncover cybercrime patterns and trends targeting our services and customers
  • Building proof-of-concept and prototype threat hunting tools, automations, and new capabilities
  • Collaborate with security engineers and cross-company stakeholders to implement comprehensive investigative and enforcement strategies
  • Lead and support complex fraud investigations involving cyber‑enabled financial crime, including online scams, business email compromise (BEC), payment fraud, account abuse, and related large‑scale fraud activity
  • Conduct analysis on large, complex data sets to detect and investigate anomalies, develop actionable insights and strategies
  • Identify and map malicious technical infrastructure used to facilitate cybercrime
  • Work independently to detect, investigate, and understand new and emerging cybercrime attack vectors
  • Partner with DCU attorneys to develop legal strategies to disrupt and impact online criminal networks
  • Drafting criminal referrals for law enforcement
  • Provide expert witness testimony in court filings and proceedings
  • Fulltime
Read More
Arrow Right

Senior Security Researcher - Linux & API Security EDR

Are you an innovative security researcher with a deep understanding of Linux sys...
Location
Location
Israel , Tel Aviv
Salary
Salary:
Not provided
paloaltonetworks.com Logo
Palo Alto Networks
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4+ years of overall experience in cybersecurity research, with a proven track record of impactful projects
  • In-depth knowledge of operating system internals, including user and kernel space
  • Proficiency in programming languages like Python, C, and/or C++, with a strong understanding of system-level programming and APIs
  • Strong knowledge of the cyber threat landscape, modern malware techniques, and APTs
  • Hands-on experience with real-world threat hunting, big-data cyber research, incident response, or detection engineering
  • Excellent problem-solving skills and a passion for cybersecurity innovation
  • Ability to work independently, take initiative, and collaborate effectively within a team
Job Responsibility
Job Responsibility
  • Playing a pivotal role in shaping the future of our security solutions
  • Enhance the effectiveness of our product by designing cutting-edge protection components and developing sophisticated detection rules
  • Research Linux OS internals, Virtualized environments, and low-level system behaviors to inform and enhance our attack prevention mechanisms
  • Investigate and develop innovative methods for detecting threats and securing APIs, ensuring robust protection for modern applications and cloud-native environments
  • Apply sophisticated AI and big data approaches to investigate and research large amounts of data across our clients
  • Research and lead novel protection ideas to a production-grade level, serving as a subject matter expert
  • Stay up to date with the latest attacker methodologies, APT campaigns, and TTPs targeting Linux systems and APIs
  • Conduct static and dynamic reverse engineering of Linux malware to uncover new techniques and develop corresponding mitigation strategies
  • Work closely with engineering, product management, and other research teams to translate research findings into production-grade features
Read More
Arrow Right

Senior Threat Emulation Team Member

As a senior member of the Threat Emulation team within Admiral’s Cyber Security ...
Location
Location
Salary
Salary:
Not provided
admiralgroup.co.uk Logo
Admiral Group Plc
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ Years of delivering offensive security exercises
  • Highly responsive and proven professionalism in communication, interpersonal, analytical, and organizational skills
  • Experience of being a technical lead on security testing engagements
  • A strong technical background is required with in-depth experience in several of the following areas: CI/CD Pipelines/DevOps
  • Cloud and Cloud Security (Specifically Azure and GCP)
  • LLM Security Considerations
  • Applications of AI in Offensive Security
  • Scenario/objective based Penetration Testing/Red Teaming
  • Purple Teaming
  • Microsoft AD, Entra and In-Tune
Job Responsibility
Job Responsibility
  • Owning the delivery of Threat Emulation services through the full lifecycle, including taking responsibility for delivery of key projects and workstreams through to completion
  • Proactively analyse business needs, research
  • recommend solutions and drive their adoption
  • Identifying key opportunities to provide current and new security testing services across the business
  • Developing novel and innovative capabilities within the team
  • Performing post exercise or incident reviews and proposing resolutions using their subject matter expertise
  • Act as a point of escalation for the team and wider cyber department
  • Mentor and develop team members and peers
  • Define, develop and improve procedures, and processes for the team and wider operations department
  • Publish reporting and communications to key stakeholders, including briefings, presentations, control group calls/updates
What we offer
What we offer
  • Everyone receives 33 days holiday (including bank holidays) when they join us, increasing the longer you stay with us, up to a maximum of 38 days (including bank holidays). You also have the option to buy or sell up to an additional five days of annual leave
  • Financial & Mortgage Advice
  • 24-Hour Ecare
  • Cycle to Work Scheme
  • Annual Holiday Allowance
  • Flexible Working
  • Simply Health
  • Private Health Cover
  • Critical Illness Cover
  • Eligible for up to £3,600 of free shares each year after one year of service
  • Fulltime
Read More
Arrow Right

Principal Applied Scientist

As the advertising ecosystem expands, sophisticated adversarial actors are lever...
Location
Location
India , Bangalore
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor’s, Master’s, or PhD degree in Computer Science, Cybersecurity, Mathematics, or a related field, with 10+ years of related experience
  • Deep technical expertise in Cybersecurity, Anti-Abuse, or Adversarial Machine Learning
  • Strong programming skills in C++ or Python (at least one is required), with experience in building production-quality security or ML systems
  • Hands-on experience in one or more of the following: Web Security standards and Authentication Protocols (OAuth, OIDC), Malware analysis, de-obfuscation, or reverse engineering, Building fraud detection models at scale
  • Proven ability to design and implement defense mechanisms against complex abuse vectors (e.g., botnets, synthetic identity, evasion/cloaking)
  • Strong communication and collaboration skills, with experience articulating complex security risks to business and product leadership
Job Responsibility
Job Responsibility
  • Strategic Threat Modeling: Develop and maintain comprehensive adversarial frameworks to map the lifecycle of emerging threats, from account compromise (ATO) to malicious payload delivery
  • Evolution of Advertiser Trust: Advance the continuous, signal-based security protocol. Research and implement behavioral biometrics and Proof of Liveness models to detect synthetic identities and coordinated fraud rings
  • Adversarial Research: Proactively identify 'unknown unknown' vulnerabilities through red-teaming and exploratory data analysis, developing models to predict attacker behavior before widespread exploitation
  • Technical Leadership: Drive the technical roadmap for integrity and security, mentoring senior engineers and influencing cross-functional stakeholders on security investment priorities
  • Fulltime
Read More
Arrow Right

Principal/ Senior Security Researcher Linux & API Security EDR

Are you an innovative security researcher with a deep understanding of Linux sys...
Location
Location
Israel , Tel Aviv
Salary
Salary:
Not provided
paloaltonetworks.it Logo
Palo Alto Networks Italia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in cybersecurity research, with a proven track record of impactful projects
  • Good knowledge of Linux OS internals, including both user and kernel space
  • Solid knowledge of the cyber threat landscape, modern malware techniques, and APTs
  • Hands-on experience in real-world threat hunting, incident response, or detection engineering
  • Proficiency in programming languages such as Python, C, and/or C++, with a strong understanding of system-level programming and APIs
  • Excellent problem-solving skills and a passion for cybersecurity innovation
  • Ability to work independently, take initiative, and collaborate effectively in a team environment
Job Responsibility
Job Responsibility
  • Play a pivotal role in shaping the future of our security solutions
  • Enhance product effectiveness by designing advanced protection components and developing sophisticated detection rules
  • Research Linux OS internals, virtualized environments, and malware behaviors to inform and strengthen our attack prevention mechanisms
  • Apply advanced AI and big data approaches to investigate and analyze large-scale datasets across our client base
  • Lead research on novel protection concepts and bring them to production-grade quality, serving as a subject matter expert
  • Stay up to date with the latest attacker methodologies, APT campaigns, and TTPs targeting Linux systems
  • Conduct static and dynamic reverse engineering of Linux malware to uncover new techniques and develop mitigation strategies
  • Collaborate closely with engineering, product management, and other research teams to translate research findings into production features
  • Fulltime
Read More
Arrow Right