USD 120000–150000/yr

Forensics Malware Analyst / Reverse Engineer (Cleared)

United StatesAlexandriaFull Timemid
OtherCybersecurityReverse EngineerMalware Analyst
0 views0 saves0 applied

Quick Summary

Requirements Summary

Ghidra, IDA Pro, Binary Ninja x64dbg, WinDbg, Volatility, Autopsy Experience with x86/x64 assembly and low-level debugging Proficiency in scriptin

Technical Tools
OtherCybersecurityReverse EngineerMalware Analyst
Position: Forensics Malware Analyst / Reverse Engineer
Clearance: Ability to obtain and maintain TS/SCI
Work Environment: Secure / Classified Programs
 
Position Overview
We are seeking a highly skilled Forensics Malware Analyst / Reverse Engineer to support advanced digital forensics and cyber threat analysis efforts on classified programs. This role focuses on reverse engineering malicious software, conducting in-depth forensic analysis of compromised systems, and uncovering adversary tactics, techniques, and procedures (TTPs).
The ideal candidate brings a strong blend of malware analysis, reverse engineering, and digital forensics experience and thrives in highly technical, mission-driven environments. Candidates must be able to obtain and maintain a TS/SCI clearance.
 
Key Responsibilities
Conduct static and dynamic malware analysis to determine functionality, intent, and impact
Perform reverse engineering of binaries to uncover persistence mechanisms, exploit behavior, and obfuscation techniques
Execute host-based and memory forensics on compromised systems
Analyze artifacts such as registry changes, file system modifications, memory dumps, and logs
Identify and document indicators of compromise (IOCs) and attack chains
Correlate forensic findings with threat intelligence and adversary TTPs
Develop scripts, tools, or automation to support malware and forensic analysis efforts
Produce clear, detailed technical reports and brief findings to stakeholders
Support incident response and post-exploitation analysis on classified networks
Stay current with emerging malware families, forensic methodologies, and reverse engineering tools
 
Required Qualifications
Bachelor’s degree in Computer Science, Cybersecurity, Computer Engineering, or a related technical field (or equivalent experience)
Hands-on experience in malware analysis, reverse engineering, and/or digital forensics
Strong understanding of Windows and/or Linux internals
Proficiency with reverse engineering and forensic tools such as:
Ghidra, IDA Pro, Binary Ninja
x64dbg, WinDbg, Volatility, Autopsy
Experience with x86/x64 assembly and low-level debugging
Proficiency in scripting or programming (Python, C/C++, or similar)
Understanding of common malware techniques including packing, encryption, obfuscation, and anti-analysis methods
Ability to obtain and maintain a TS/SCI clearance
 
Preferred Qualifications
Prior experience supporting DOD, Intelligence Community, or federal cyber programs
Experience with memory forensics and live response
Familiarity with network forensics and PCAP analysis
Experience analyzing APT or nation-state malware
Kernel-mode, firmware, or embedded system reverse engineering experience
Active TS/SCI clearance
 
Work Environment
Work performed in a secure, classified environment
Highly technical, mission-critical role supporting national security
Collaboration with elite cyber, intelligence, and engineering teams
 
#LAT

Listing Details

Posted
January 23, 2026
First seen
March 26, 2026
Last seen
April 24, 2026

Posting Health

Days active
29
Repost count
0
Trust Level
44%
Scored at
April 24, 2026

Signal breakdown

freshnesssource trustcontent trustemployer trust
Latitudeinc

Technology and engineering staffing firm serving public and private sector clients in the DC corridor

Employees
56
Founded
2003
View company profile
Newsletter

Stay ahead of the market

Get the latest job openings, salary trends, and hiring insights delivered to your inbox every week.

A
B
C
D
Join 12,000+ marketers

No spam. Unsubscribe at any time.

LatitudeincForensics Malware Analyst / Reverse Engineer (Cleared)USD 120000–150000