Job Description
Role: Senior Malware Researcher (5–8 Years)
Job Summary/ Role Overview
We are looking for a Senior Malware Researcher with strong expertise in static and dynamic malware analysis to support advanced threat detection and malware intelligence initiatives. This Role requires hands-on experience in malware investigation, signature development, and threat categorization.
The ideal candidate will act as a subject matter expert (SME) , contributing to analysis accuracy, malware categorization, and overall detection quality
Key Responsibilities
- Perform in‑depth static and dynamic analysis of malware samples, binaries, scripts, and suspicious applications across multiple platforms
- Analyze malware execution behavior using sandboxing, debugging, and behavioral monitoring techniques
- Advanced reverse engineering skills (Windows malware, x86/x64)
- Develop, tune, and validate signatures for malware detection and classification
- Conduct advanced malware reverse engineering to understand payload behavior, infection vectors, persistence techniques, and command‑and‑control mechanisms.
- Provide clear verdicts and categorization of files and applications (Malicious, Benign, Grayware, PUA, etc.) based on evidence
- Create high‑quality technical documentation , analysis reports, and investigation notes to support SOC, detection, and engineering teams
- Stay updated on emerging malware families, threat actor techniques, evasion methods, and industry trends
Mandatory Technical Skills
- 5–8 years of experience in malware research or threat analysis
· Strong understanding of:
- Malware types (Trojans, Downloaders, Ransomware, Droppers, Loaders)
- Obfuscation, anti‑debugging, and evasion techniques
· Hands‑on experience with tools such as IDA Pro / Ghidra, x64dbg, Cuckoo Sandbox, ProcMon, Wireshark
Or
Proven experience with malware analysis and reverse engineering tools such as:
- Disassemblers/Decompilers: IDA Pro, Ghidra, Radare2
- Debuggers: x64dbg, WinDbg, OllyDbg
- Sandboxing/Behavioral Tools: Cuckoo Sandbox, Joe Sandbox
- Analysis Utilities: PEStudio, ProcMon, Regshot, Wireshark
- Good understanding of malware signatures, heuristics, and behavior‑based detection
- Strong documentation and communication skills
Preferred Skills
- Experience with AI/ML‑driven malware detection techniques , including behavior‑based and anomaly‑based analysis
- Experience combining signature‑based, heuristic, and AI‑based detections to improve overall accuracy
- Scripting or automation experience using Python , PowerShell, or similar languages
- Familiarity with malware evasion and obfuscation techniques OR Knowledge of evasion techniques targeting AI models and techniques to handle adversarial or obfuscated samples
Apply for this Position
Ready to join ? Click the button below to submit your application.
Submit Application