Enable job alerts via email!

On-Demand Malware Analyst / Reverse Engineer

Malcore

United States

Remote

USD 60,000 - 80,000

Full time

2 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Join a forward-thinking company as an On-Demand Malware Analyst, where you will engage in exciting challenges from basic file triaging to deep reverse engineering. In this contract-based role, you will analyze malware, reconstruct command-and-control protocols, and generate detection signatures. This position offers flexibility with work hours and the opportunity to work independently on various projects. If you are passionate about cybersecurity and enjoy tackling complex problems, this role is perfect for you, providing a competitive pay structure based on your skills and experience.

Qualifications

  • Proficiency in C and assembly language is essential.
  • Experience with malware classification and evasion techniques is preferred.

Responsibilities

  • Perform static and dynamic malware analysis on various samples.
  • Generate detection signatures and write concise analysis reports.

Skills

Malware Analysis
Reverse Engineering
C Programming
Assembly Language
Python Scripting
Static Analysis Tools
Dynamic Analysis Tools
Command-and-Control Protocols

Tools

Binary Ninja
Ghidra
IDA Pro
x64dbg
Frida

Job description

On-Demand Malware Analyst / Reverse Engineer

Get AI-powered advice on this job and more exclusive features.

This is a contract-based, on-demand role. When work is available, you will be requested to work; it is up to you to accept. Some weeks will be busy, others may be quiet. You’ll handle everything from basic file triaging to deep reverse engineering, including payload analysis, C2 reconstruction, and signature generation.

Responsibilities:

  • Perform static and dynamic malware analysis
  • Reverse engineer binaries to determine functionality, behavior, and capabilities
  • Deconstruct obfuscated payloads and packed samples
  • Reconstruct command-and-control protocols
  • Generate accurate detection signatures (e.g., YARA) and behavioral IOCs
  • Write concise, actionable analysis reports

Qualifications:

  • Proficiency in reading and understanding C and assembly (x86/x64/ARM)
  • Familiarity with tools like Binary Ninja, Ghidra, IDA Pro, x64dbg, or Frida
  • Ability to script in Python or other languages for automation or decoding
  • Understanding of operating system internals: Windows, macOS, Linux, iOS, and Android (preferred but not mandatory)
  • Experience with malware classification, obfuscation techniques, and evasion behaviors
  • Ability to work independently, on short notice, with high attention to detail

Additional Notes:

  • This is not a full-time role. You will be paid hourly for assigned and completed work.
  • NDAs and contracts may be required depending on the client.
  • Pay is competitive and based on experience and sample complexity.
  • If you bring in a client, you’ll receive a bonus per hour for work completed for them; bonus is on a per-client basis.
Seniority level
  • Entry level
Employment type
  • Contract
Job function
  • Engineering and Information Technology
Industries
  • Data Security Software Products

Referrals increase your chances of interviewing at Malcore by 2x.

Get notified about new Malware Analyst jobs in United States.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.