Job Description

Role: Senior Malware Researcher (5–8 Years)

Job Summary/ Role Overview

We are looking for a Senior Malware Researcher with strong expertise in static and dynamic malware analysis to support advanced threat detection and malware intelligence initiatives. This Role requires hands-on experience in malware investigation, signature development, and threat categorization.

The ideal candidate will act as a subject matter expert (SME) , contributing to analysis accuracy, malware categorization, and overall detection quality

Key Responsibilities

  • Perform in‑depth static and dynamic analysis of malware samples, binaries, scripts, and suspicious applications across multiple platforms
  • Analyze malware execution behavior using sandboxing, debugging, and behavioral monitoring techniques
  • Advanced reverse engineering skills (Windows malware, x86/x64)
  • Develop, tune, and validate signatures for malware detection and classification
  • Conduct advanced malware reverse engineering to understand payload behavior, infection vectors, persistence techniques, and command‑and‑control mechanisms.
  • Provide clear verdicts and categorization of files and applications (Malicious, Benign, Grayware, PUA, etc.) based on evidence
  • Create high‑quality technical documentation , analysis reports, and investigation notes to support SOC, detection, and engineering teams
  • Stay updated on emerging malware families, threat actor techniques, evasion methods, and industry trends

Mandatory Technical Skills

  • 5–8 years of experience in malware research or threat analysis

· Strong understanding of:

  • Malware types (Trojans, Downloaders, Ransomware, Droppers, Loaders)
  • Obfuscation, anti‑debugging, and evasion techniques

· Hands‑on experience with tools such as IDA Pro / Ghidra, x64dbg, Cuckoo Sandbox, ProcMon, Wireshark

Or

Proven experience with malware analysis and reverse engineering tools such as:

  • Disassemblers/Decompilers: IDA Pro, Ghidra, Radare2
  • Debuggers: x64dbg, WinDbg, OllyDbg
  • Sandboxing/Behavioral Tools: Cuckoo Sandbox, Joe Sandbox
  • Analysis Utilities: PEStudio, ProcMon, Regshot, Wireshark


  • Good understanding of malware signatures, heuristics, and behavior‑based detection
  • Strong documentation and communication skills


Preferred Skills

  • Experience with AI/ML‑driven malware detection techniques , including behavior‑based and anomaly‑based analysis
  • Experience combining signature‑based, heuristic, and AI‑based detections to improve overall accuracy
  • Scripting or automation experience using Python , PowerShell, or similar languages
  • Familiarity with malware evasion and obfuscation techniques OR Knowledge of evasion techniques targeting AI models and techniques to handle adversarial or obfuscated samples

Apply for this Position

Ready to join ? Click the button below to submit your application.

Submit Application