Reverse Engineer, Level 4

Independent SoftwareColumbia, MD

About The Position

At Independent Software, as a Reverse Engineer Level 4, you will apply advanced technical expertise to support mission-critical national security operations. In this role, you will analyze malicious software, uncover adversary techniques, and contribute to the development of defensive strategies that protect critical systems and data. You will perform detailed static and dynamic analysis of malicious binaries, identify indicators of compromise (IOCs), and map adversary behavior to known tactics, techniques, and procedures (TTPs). Your work will directly support detection, attribution, and mitigation efforts across cyber defense environments.

Requirements

  • Proficiency in reverse engineering malicious binaries, including static analysis of assembly code
  • Experience working with malware analysis, APT activity, and threat detection techniques
  • Strong understanding of computer networking concepts and protocols
  • Experience with C/C++ and/or other low-level programming languages
  • Experience developing detection signatures and mitigation strategies
  • Ability to identify areas of risk and recommend effective mitigation approaches
  • Strong analytical, problem-solving, and critical thinking skills
  • Effective written and verbal communication skills

Nice To Haves

  • One of the following certifications is required: CISSP, GIAC GREM, CREA
  • Additional Information Assurance certifications may be required based on program needs
  • Must possess an active TS SCI with appropriate Polygraph to be considered for this role

Responsibilities

  • Perform advanced static and dynamic analysis of malicious binaries and software artifacts
  • Analyze assembly code to understand malware functionality and behavior
  • Identify indicators of compromise (IOCs), callbacks, and adversary techniques
  • Bypass obfuscation and anti-analysis mechanisms to uncover hidden behaviors
  • Develop and implement detection signatures (e.g., YARA, SNORT) and mitigation strategies
  • Correlate malware activity with APT behaviors, infrastructure, and TTPs
  • Support malware detection and response efforts through technical analysis and reporting
  • Provide actionable intelligence and recommendations to mitigate cyber risks
  • Collaborate with cross-functional teams to support target analysis and mission objectives
  • Apply computer networking knowledge to analyze communication patterns and threat activity

Benefits

  • competitive compensation
  • generous benefits
  • work-life balance
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service