Mid-Level Malware Analyst

SPECIAL AEROSPACE SECURITY SERVICES INCWashington, DC
Hybrid

About The Position

Special Aerospace Security Services, Inc. (SASSI) is seeking a Senior Malware Analyst to support a U.S. Government customer. The ideal candidate will be a technical expert in malware analysis, capable of working independently with minimal to no technical training required. This role demands advanced proficiency in malware analysis disciplines including mobile forensics, file and software analysis, phishing/email analysis, and URL/domain analysis. The selected candidate will be expected to handle everyday malware work (Tier 1 email analysis, file analysis of executables, etc.) at a senior level, while training will be focused only on Customer-specific processes and procedures.

Requirements

  • U.S. Citizenship (required).
  • Active Secret clearance (minimum; TS/SCI preferred).
  • Bachelor’s degree in Cybersecurity, Computer Science, Digital Forensics, or related discipline (may be substituted with equivalent experience).
  • 8+ years of malware analysis, reverse engineering, or forensic experience.
  • Proven ability to operate as a senior-level analyst without technical training in: Mobile forensics, File and software analysis, Email analysis (phishing detection), URL/domain analysis.
  • Expertise in Windows/Linux internals, file systems, and executable formats.
  • Strong knowledge of network protocols (TCP/IP, HTTP/S, DNS).
  • Proficiency with malware analysis and forensics tools: IDA Pro, Ghidra, Binary Ninja, Radare2, Volatility, Cellebrite, Oxygen Forensics, FTK, EnCase, X-Ways, Cuckoo Sandbox, ANY.RUN, VirusTotal Enterprise.
  • Scripting for automation: Python, Bash, PowerShell.
  • Familiarity with MITRE ATT&CK, STIX/TAXII, and threat intelligence feeds.
  • Required Certifications (one or more): CASP+, CISSP, GCED, GCIH.

Nice To Haves

  • TS/SCI clearance strongly preferred.
  • Preferred Certifications (one or more): GREM, OSCP / OSCE / OSEP, CEH, CREA, GCFA / GNFA.

Responsibilities

  • Conduct advanced static and dynamic malware analysis to uncover behavior, capabilities, and delivery mechanisms.
  • Perform reverse engineering using tools such as IDA Pro, Ghidra, Binary Ninja to analyze compiled code and embedded threats.
  • Lead and conduct mobile device forensic investigations (iOS/Android).
  • Conduct file and software analysis to detect malicious payloads, trojans, and obfuscation techniques.
  • Perform email analysis to identify phishing attempts, malicious attachments, and social engineering vectors.
  • Conduct URL/domain analysis to uncover malicious redirection, spoofing tactics, and C2 infrastructure.
  • Capture and analyze volatile memory, logs, and artifacts from compromised systems.
  • Develop detection signatures, IOCs, YARA rules, and threat models based on analysis.
  • Collaborate with incident response, SOC, and threat intelligence teams.
  • Produce detailed technical reports and risk analysis briefings for senior leadership.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service