Jr Malware Engineer jobs in United States
cer-icon
Apply on Employer Site
company-logo

Peraton · 8 hours ago

Jr Malware Engineer

Peraton is a next-generation national security company that drives missions of consequence. They are currently hiring for a Junior Malware Reverse Engineer role within their Federal Strategic Cyber group, where the successful candidate will analyze and reverse-engineer malicious binaries to support cyber operations and protect critical government systems.

Information TechnologyRobotics
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Analyze, isolate, and reverse-engineer malicious binaries to determine behavior, functionality, and capabilities
Conduct static and dynamic analysis of malware samples across multiple operating systems
Produce detailed technical reports outlining findings, characteristics, and threat implications
Support ongoing cyber operations with timely malware insights and assessments
Recommend countermeasures and mitigation strategies for malware and exploitation techniques targeting government communication systems
Reverse-engineer known and suspected malware files to support incident response and threat-hunting activities
Develop and refine policies, procedures, and methodologies for malware investigations across diverse networks

Qualification

Malware analysisReverse-engineering methodologiesStaticDynamic analysisDisassemblers experienceProgramming JavaProgramming CProgramming C++Debugging experienceLinuxMacOSWindowsTechnical reportingCommunication skills

Required

Bachelor's degree with 5+ years of relevant technical experience, or a Master's degree with 3+ years of experience. An additional 4 years of experience may be substituted for a degree
Experience analyzing malicious applications across multiple platforms, including Linux, macOS, Windows, iOS, Android, and IoT devices
Familiarity with tools such as: Process Explorer, CFF Explorer, Wireshark, Fiddler, Regshot, Process Monitor, Process Hacker
Demonstrated strong understanding of reverse-engineering methodologies and file reconstruction
Ability to unpack, de-obfuscate, and analyze highly complex malicious applications
Hands-on debugging experience, including identifying and defeating custom or known packers
Experience with disassemblers and disassembly workflows
U.S. citizenship required
Active Secret Clearance with the ability to obtain TS/SCI
Ability to obtain and maintain a DHS EOD background investigation

Preferred

Programming knowledge in one or more of the following: Java, C, C++, .NET, PowerShell, Golang, C#
Familiarity with ICS/SCADA environments and related security considerations

Benefits

Medical
Dental
Vision
Life
Health savings account
Short/long term disability
EAP
Parental leave
401(k)
Paid time off (PTO) for vacation
Company paid holidays

Company

Peraton Fearlessly solving the toughest national security challenges.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Thomas Terjesen
Chief Information Officer
linkedin
Company data provided by crunchbase