Malware Reverse Engineer jobs in United States
cer-icon
Apply on Employer Site
company-logo

Spry Methods, Inc. · 3 days ago

Malware Reverse Engineer

Spry Methods is seeking a Malware Reverse Engineer to perform advanced malware analysis and reverse engineering. The role involves determining the maliciousness and capabilities of malware, extracting indicators of compromise, and producing analysis outputs to support investigative processes.

ComputerEnterpriseInformation Technology
check
Work & Life Balance
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Conduct static and dynamic analysis of binaries and scripts; reverse engineer across architectures (x86/x64, ARM/ARM64, MIPS, others as needed)
Analyze packed/obfuscated/encrypted code; build unpacking/decryption routines where required
Use tools such as IDA Pro, Ghidra, Binary Ninja, WinDbg, x64dbg, and related debuggers/disassemblers
Extract IOCs; develop YARA rules and behavioral signatures to support detection and mitigation
Identify persistence mechanisms, anti-analysis, and C2 protocols; assess multi-platform malware (Windows, Linux, macOS, mobile, embedded/IoT)
Produce thorough documentation of findings and conclusions; communicate clearly to non-expert audiences
Successfully complete a mock examination and defend results in a practical courtroom exercise (Government-run)
Support taskings that may require extended/irregular hours and location-specific needs depending on operational investigative activity

Qualification

Malware Reverse EngineeringStaticDynamic AnalysisPython/PowerShell/BashYARA Rules DevelopmentDocumentation SkillsIndependenceProblem SolvingCommunication Skills

Required

U.S. Citizenship required
Active TS clearance with SCI eligibility required
Demonstrated hands-on experience with advanced malware reverse engineering across architectures and platforms
Ability to work independently on complex problems without higher-tier escalation support; self-directed research and rapid learning

Preferred

Proficiency in Python/PowerShell/Bash; additional experience in C/C++, Go, or Rust
Familiarity with common malware families and threat actor TTPs; experience building detection content (YARA, behavioral signatures)

Company

Spry Methods, Inc.

twittertwittertwitter
company-logo
Spry is a certified Small Business headquartered in McLean, VA.

Funding

Current Stage
Growth Stage

Leadership Team

T
Ted Ahn
Co-Chief Executive Officer
linkedin
Company data provided by crunchbase