HamburgerMenu
hirist

Job Description

Job Summary :

We are looking for a Malware Analyst & Reverse Engineer to join our Cyber Intelligence team. The role involves analyzing malicious software, reverse engineering binaries and mobile applications, identifying attacker techniques, and producing actionable intelligence to support detection, response, and threat hunting activities.

This role includes exposure to Windows, Linux, and Android malware, mobile app security, and offensive security techniques.

Key Responsibilities :

- Perform static and dynamic malware analysis on executables, scripts, and Android applications (APK/AAB)

- Conduct reverse engineering of malware and mobile applications

- Identify and extract Indicators of Compromise (IOCs) such as hashes, domains, IPs, and C2 patterns

- Analyze obfuscation, packing, and anti-analysis techniques

- Perform Android app security analysis (static and runtime)

- Map malware behavior to the MITRE ATT&CK framework

- Create detailed malware and mobile threat analysis reports

- Support SOC, Incident Response, and Threat Hunting teams

Required Skills & Qualifications :


Malware Analysis & Reverse Engineering :


- Strong understanding of Windows internals and malware execution flow

- Hands-on experience with static and dynamic analysis tools such as IDA Pro, Ghidra, and Radare2

- Experience with debuggers and sandboxes including x64dbg, WinDbg, Cuckoo Sandbox, and Any.Run

- Proficiency in assembly language (x86/x64)

- Experience analyzing packers, shellcode, and malicious scripts

Android Security & Development Awareness :

- Libraries awareness: KTOR, Retrofit, Room DB, Jetpack Compose

- Frameworks & IDE awareness: Android Studio, Flutter

- Architecture patterns: MVVM, MVC

- Experience in reverse engineering Android applications

- Ability to understand Android app logic during security assessment

- Minimum one published application on the Google Play Store

Ethical Hacking & Offensive Security :

- Practical knowledge of Metasploit framework

- Hands-on use of CyberChef for encryption/decryption and encoding/decoding

- Understanding of payloads, droppers, loaders, and exploit chains

- Familiarity with attacker techniques from an offensive security perspective

Programming & Scripting :

- Proficiency in Python

- Working knowledge of C/C++ and PowerShell

- Experience writing YARA rules for malware detection

Good to Have (Preferred Skills) :

- Experience with Android malware and mobile threat analysis

- Understanding of Linux malware

- Knowledge of cryptographic implementations in malware

- Exposure to exploit development or shellcode analysis

- Prior Red Team or Offensive Security experience

- Public research, blogs, tools, or CTI contributions

Tools & Platforms :

- IDA Pro, Ghidra, Radare2

- x64dbg, WinDbg

- Cuckoo Sandbox, Any.Run, Hybrid Analysis

- Wireshark, Procmon, Process Explorer

- YARA, VirusTotal

- Android Studio, JADX, Apktool

VMware / VirtualBox

info-icon

Did you find something suspicious?

Similar jobs that you might be interested in