
Forensics Malware Analyst, Reverse Engineer
Latitude Inc
full-time
Posted on:
Location Type: Hybrid
Location: Alexandria • Virginia • United States
Visit company websiteExplore more
Salary
💰 $120,000 - $150,000 per year
About the role
- Conduct static and dynamic malware analysis to determine functionality, intent, and impact
- Perform reverse engineering of binaries to uncover persistence mechanisms, exploit behavior, and obfuscation techniques
- Execute host-based and memory forensics on compromised systems
- Analyze artifacts such as registry changes, file system modifications, memory dumps, and logs
- Identify and document indicators of compromise (IOCs) and attack chains
- Correlate forensic findings with threat intelligence and adversary TTPs
- Develop scripts, tools, or automation to support malware and forensic analysis efforts
- Produce clear, detailed technical reports and brief findings to stakeholders
- Support incident response and post-exploitation analysis on classified networks
- Stay current with emerging malware families, forensic methodologies, and reverse engineering tools
Requirements
- Bachelor’s degree in Computer Science, Cybersecurity, Computer Engineering, or a related technical field (or equivalent experience)
- Hands-on experience in malware analysis, reverse engineering, and/or digital forensics
- Strong understanding of Windows and/or Linux internals
- Proficiency with reverse engineering and forensic tools such as:
- Ghidra, IDA Pro, Binary Ninja
- x64dbg, WinDbg, Volatility, Autopsy
- Experience with x86/x64 assembly and low-level debugging
- Proficiency in scripting or programming (Python, C/C++, or similar)
- Understanding of common malware techniques including packing, encryption, obfuscation, and anti-analysis methods
- Ability to obtain and maintain a TS/SCI clearance.
- Prior experience supporting DOD, Intelligence Community, or federal cyber programs
- Experience with memory forensics and live response
- Familiarity with network forensics and PCAP analysis
- Experience analyzing APT or nation-state malware
- Kernel-mode, firmware, or embedded system reverse engineering experience
- Active TS/SCI clearance
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
malware analysisreverse engineeringdigital forensicsmemory forensicsscriptingx86 assemblyx64 assemblylow-level debuggingnetwork forensicsPCAP analysis
Soft Skills
communicationreport writingstakeholder engagement
Certifications
TS/SCI clearance