Mid-level Malware Engineer jobs in United States
cer-icon
Apply on Employer Site
company-logo

Peraton · 19 hours ago

Mid-level Malware Engineer

Peraton is a next-generation national security company that drives missions of consequence spanning the globe. They are currently hiring a Mid-Level Malware Reverse Engineer to dissect advanced threats, support active cyber operations, and help shape defensive strategies that protect high‑value government networks.

Information TechnologyRobotics
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Isolate, analyze, and reverse‑engineer malicious binaries to determine behavior, functionality, and intent
Perform static and dynamic analysis on malware samples across diverse platforms
Produce detailed technical reports outlining findings, characteristics, and operational implications of malicious code
Support active cyber operations and contribute to mission‑driven malware analysis efforts
Recommend countermeasures and mitigation strategies for malware targeting government communication systems
Conduct reverse engineering on known and suspected malware to support incident response and threat‑hunting activities
Develop and refine policies, procedures, and methodologies for malware investigations across multiple networks

Qualification

Malware analysisReverse engineeringStaticDynamic analysisPythonDisassembly workflowsDebuggingTechnical reportingCommunication skillsTeam collaborationProblem-solving

Required

Bachelor's degree with 8+ years of relevant technical experience, or a Master's degree with 6+ years of experience
An additional 4 years of experience may be substituted for a degree
Experience analyzing malicious applications across Linux, macOS, Windows, iOS, Android, and IoT devices
Hands-on experience with several of the following tools: IDA Pro, OllyDbg, x64dbg, Scylla x64, Objdump, Readelf, Ghidra, Process Explorer, CFF Explorer, Wireshark, Fiddler, Regshot, Process Monitor, Process Hacker
Demonstrated strong understanding of reverse-engineering methodologies and file reconstruction
Ability to unpack, de-obfuscate, and analyze highly complex malicious applications
Debugging experience, including identifying and defeating custom or known packers
Experience with disassemblers and disassembly workflows
U.S. citizenship required
Active Top Secret Clearance with the ability to obtain SCI
Ability to obtain and maintain a DHS EOD background investigation

Preferred

Experience with Python for automation or tooling
Programming knowledge in one or more of the following: Java, C, C++, .NET, PowerShell, Golang, C#
Familiarity with ICS/SCADA systems and related security considerations

Benefits

Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.

Company

Peraton Fearlessly solving the toughest national security challenges.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Thomas Terjesen
Chief Information Officer
linkedin
Company data provided by crunchbase