Reverse Engineer 4

GormatSan Antonio, TX

About The Position

Seeking Reverse Engineering support to perform technical analysis of malicious binaries using various methods and determine functionality and indicators of compromise. You will provide information that assists with malware detection and mitigation. Experience with malware reverse engineering is required. The Reverse Engineer 4 shall possess the following capabilities: Technical analysis of malicious binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis, in order to ascertain functionality, capability, call-backs, assist with attribution to adversary infrastructure, and identification of indicators of compromise. Provide information and documentation that enables malware detection, signature creation, and mitigation. Perform technical analysis of malicious binaries using various methods and determine functionality and indicators of compromise; provide information that assists with malware detection and mitigation; experience with malware and reverse engineering is required.

Requirements

  • Bachelor's degree and 11 years' relevant experience OR Master's degree and 9 years of relevant experience or a Doctoral degree and 7 years of relevant experience. An associates degree plus 13 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the positions. Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university.
  • CISSP, GIAC GREM or CREA Certification is required
  • TS/SCI with polygraph is required.
  • Experience with malware reverse engineering is required.

Responsibilities

  • Technical analysis of malicious binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis, in order to ascertain functionality, capability, call-backs, assist with attribution to adversary infrastructure, and identification of indicators of compromise.
  • Provide information and documentation that enables malware detection, signature creation, and mitigation.
  • Perform technical analysis of malicious binaries using various methods and determine functionality and indicators of compromise; provide information that assists with malware detection and mitigation
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service