Job Summary :
We are looking for a Malware Analyst & Reverse Engineer to join our Cyber Intelligence team. The role involves analyzing malicious software, reverse engineering binaries and mobile applications, identifying attacker techniques, and producing actionable intelligence to support detection, response, and threat hunting activities.
This role includes exposure to Windows, Linux, and Android malware, mobile app security, and offensive security techniques.
Key Responsibilities :
- Perform static and dynamic malware analysis on executables, scripts, and Android applications (APK/AAB)
- Conduct reverse engineering of malware and mobile applications
- Identify and extract Indicators of Compromise (IOCs) such as hashes, domains, IPs, and C2 patterns
- Analyze obfuscation, packing, and anti-analysis techniques
- Perform Android app security analysis (static and runtime)
- Map malware behavior to the MITRE ATT&CK framework
- Create detailed malware and mobile threat analysis reports
- Support SOC, Incident Response, and Threat Hunting teams
Required Skills & Qualifications :
Malware Analysis & Reverse Engineering :
- Strong understanding of Windows internals and malware execution flow
- Hands-on experience with static and dynamic analysis tools such as IDA Pro, Ghidra, and Radare2
- Experience with debuggers and sandboxes including x64dbg, WinDbg, Cuckoo Sandbox, and Any.Run
- Proficiency in assembly language (x86/x64)
- Experience analyzing packers, shellcode, and malicious scripts
Android Security & Development Awareness :
- Libraries awareness: KTOR, Retrofit, Room DB, Jetpack Compose
- Frameworks & IDE awareness: Android Studio, Flutter
- Architecture patterns: MVVM, MVC
- Experience in reverse engineering Android applications
- Ability to understand Android app logic during security assessment
- Minimum one published application on the Google Play Store
Ethical Hacking & Offensive Security :
- Practical knowledge of Metasploit framework
- Hands-on use of CyberChef for encryption/decryption and encoding/decoding
- Understanding of payloads, droppers, loaders, and exploit chains
- Familiarity with attacker techniques from an offensive security perspective
Programming & Scripting :
- Proficiency in Python
- Working knowledge of C/C++ and PowerShell
- Experience writing YARA rules for malware detection
Good to Have (Preferred Skills) :
- Experience with Android malware and mobile threat analysis
- Understanding of Linux malware
- Knowledge of cryptographic implementations in malware
- Exposure to exploit development or shellcode analysis
- Prior Red Team or Offensive Security experience
- Public research, blogs, tools, or CTI contributions
Tools & Platforms :
- IDA Pro, Ghidra, Radare2
- x64dbg, WinDbg
- Cuckoo Sandbox, Any.Run, Hybrid Analysis
- Wireshark, Procmon, Process Explorer
- YARA, VirusTotal
- Android Studio, JADX, Apktool
VMware / VirtualBox