Назад
Company hidden
7 дней назад

Forensics Malware Analyst / Reverse Engineer (Cybersecurity)

120 000 - 150 000$
Формат работы
hybrid
Тип работы
fulltime
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Forensics Malware Analyst / Reverse Engineer (Cybersecurity): Analyzing and reverse engineering malicious software and conducting digital forensics on compromised systems with an accent on uncovering adversary TTPs and persistence mechanisms. Focus on binary analysis, host-based forensics, and developing automation tools for classified programs.

Location: Hybrid in Alexandria, VA. Must be able to obtain and maintain a TS/SCI clearance

Salary: $120,000 - $150,000 a year

Company

hirify.global Inc is a technical services provider specializing in cybersecurity and staffing for secure, classified programs.

What you will do

  • Conduct static and dynamic malware analysis to determine functionality, intent, and impact.
  • Reverse engineer binaries to uncover persistence mechanisms, exploit behavior, and obfuscation techniques.
  • Execute host-based and memory forensics on compromised systems and analyze artifacts.
  • Identify and document indicators of compromise (IOCs) and correlate findings with threat intelligence.
  • Develop scripts and automation tools to support malware and forensic analysis efforts.
  • Produce detailed technical reports and brief findings to stakeholders.

Requirements

  • Bachelor's degree in Computer Science, Cybersecurity, Computer Engineering, or equivalent experience.
  • Hands-on experience in malware analysis, reverse engineering, and/or digital forensics.
  • Proficiency with tools such as Ghidra, IDA Pro, Binary Ninja, x64dbg, WinDbg, Volatility, and Autopsy.
  • Strong understanding of Windows/Linux internals and x86/x64 assembly.
  • Programming proficiency in Python, C/C++, or similar languages.
  • Ability to obtain and maintain a TS/SCI clearance

Nice to have

  • Prior experience supporting DOD, Intelligence Community, or federal cyber programs.
  • Experience analyzing APT or nation-state malware.
  • Active TS/SCI clearance.
  • Kernel-mode, firmware, or embedded system reverse engineering experience.
  • Familiarity with network forensics and PCAP analysis.

Culture & Benefits

  • Work performed in a secure, classified environment supporting national security.
  • Highly technical, mission-critical role.
  • Collaboration with elite cyber, intelligence, and engineering teams.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →