Reverse Engineer, Level 2
What you will be doing:
As a Reverse Engineer / Malware Analyst at Independent Software, you will play a critical role in analyzing and understanding malicious software supporting global cyber threat investigations.
In this role, you will conduct in-depth static and dynamic analysis of malware, including reverse engineering binaries at the assembly level, to uncover functionality, capabilities, command-and-control (C2) behavior, and adversary intent. You will work to defeat obfuscation and anti-analysis techniques, enabling deeper insight into advanced threats.
You will support mission operations by identifying indicators of compromise (IOCs), contributing to threat attribution, and enabling detection, mitigation, and defensive actions. This position requires a highly independent analyst who can operate with minimal oversight and drive technical investigations from start to finish.
Key Responsibilities:
- Perform static and dynamic analysis of malicious binaries using tools such as IDA Pro and/or Ghidra
- Reverse engineer malware at the assembly level to determine functionality, behavior, and communication patterns
- Identify command-and-control (C2) mechanisms, callbacks, and persistence techniques
- Defeat anti-analysis, obfuscation, and packing techniques used by advanced malware
- Analyze malware associated with global cyber threats and adversary campaigns
- Identify and document indicators of compromise (IOCs) and adversary tactics, techniques, and procedures (TTPs)
- Support threat attribution efforts by linking malware to adversary infrastructure and activity
- Develop detailed technical reports to support detection, signature development, and mitigation strategies
- Collaborate with cyber analysts, threat hunters, and mission teams to operationalize findings
- Work independently to conduct investigations and deliver actionable intelligence
Required Skills and Qualifications:
- Proven experience in malware reverse engineering
- Strong proficiency with IDA Pro and/or Ghidra (required)
- Experience performing static and dynamic malware analysis
- Strong understanding of:
- Assembly language
- Operating system internals (Windows/Linux)
- Malware behaviors and exploitation techniques
- Experience analyzing malware tied to global cyber threats or adversary activity
- Ability to identify and analyze:
- Indicators of compromise (IOCs)
- Command-and-control (C2) communications
- Obfuscation and anti-analysis techniques
- Ability to work independently and drive technical investigations
- Strong analytical, problem-solving, and documentation skills
Education and Experience:
- Doctoral degree with 2 years of relevant experience, OR
- Master’s degree with 3 years of relevant experience, OR
- Bachelor’s degree with 5 years of relevant experience, OR
- Associate degree with 7 years of relevant experience
- Computer Science
- Computer Engineering
- Information Systems
- Or a related technical discipline
- Malware reverse engineering
- Cyber threat analysis or related field
Certifications:
One of the following is required:
- CISSP
- GIAC GREM
- CREA Certification
- Additional Information Assurance certifications may be required based on program needs
At Independent Software, our people are the mission. We’ve built a company around collaboration, integrity, and innovation and we make sure our team has the tools and support to grow, succeed, and thrive.
When you join us, you will: Support critical national security missions that matter Be part of a close-knit, employee-first culture where your voice is heard
Ready to take the next step in your career? Join us and be part of something bigger.
Apply today.
We’re an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.