Jr Malware Engineer jobs in United States
cer-icon
Apply on Employer Site
company-logo

Peraton · 20 hours ago

Jr Malware Engineer

Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As a Junior Malware Reverse Engineer, you’ll work hands‑on with malicious binaries, support active cyber operations, and contribute to defensive strategies that protect critical government systems.

Information TechnologyRobotics
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Analyze, isolate, and reverse‑engineer malicious binaries to determine behavior, functionality, and capabilities
Conduct static and dynamic analysis of malware samples across multiple operating systems
Produce detailed technical reports outlining findings, characteristics, and threat implications
Support ongoing cyber operations with timely malware insights and assessments
Recommend countermeasures and mitigation strategies for malware and exploitation techniques targeting government communication systems
Reverse‑engineer known and suspected malware files to support incident response and threat‑hunting activities
Develop and refine policies, procedures, and methodologies for malware investigations across diverse networks

Qualification

Malware analysisReverse engineeringStaticDynamic analysisDisassembly workflowsProgramming knowledgeDebugging experienceToolsICS/SCADA familiarityTechnical reporting

Required

Bachelor's degree with 5+ years of relevant technical experience, or a Master's degree with 3+ years of experience
An additional 4 years of experience may be substituted for a degree
Experience analyzing malicious applications across multiple platforms, including Linux, macOS, Windows, iOS, Android, and IoT devices
Familiarity with tools such as: Process Explorer, CFF Explorer, Wireshark, Fiddler, Regshot, Process Monitor, Process Hacker
Demonstrated strong understanding of reverse-engineering methodologies and file reconstruction
Ability to unpack, de-obfuscate, and analyze highly complex malicious applications
Hands-on debugging experience, including identifying and defeating custom or known packers
Experience with disassemblers and disassembly workflows
U.S. citizenship required
Active Secret Clearance with the ability to obtain TS/SCI
Ability to obtain and maintain a DHS EOD background investigation

Preferred

Programming knowledge in one or more of the following: Java, C, C++, .NET, PowerShell, Golang, C#
Familiarity with ICS/SCADA environments and related security considerations

Benefits

Employees may be eligible for overtime
Shift differential
Discretionary bonus

Company

Peraton Fearlessly solving the toughest national security challenges.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Thomas Terjesen
Chief Information Officer
linkedin
Company data provided by crunchbase