Reverse Engineer

Closure TechnologiesChantilly, VA

About The Position

You are a reverse engineer that decompiles malicious code. You know how to spot the "evil" and not fall for the deceptive code written by hackers to throw you off their trail. You have the skills to remove the obfuscation, decrypt the strings, identify the command-and-control links, find the functions, and even determine the compiler language used to make the malware. You have honed your craft looking at real attack vectors, running down leads in the ether of network flow data or within the perishable pages of memory on compromised hosts. Now imagine yourself in a place where you are no longer constrained by the "push-button" and "wipe-and remediate" culture of incident response. A place where you will be afforded the time, resources, and toolsets to dive deep and explore the most advanced malware exemplars you have ever seen. A place where your technical skill is highly regarded and you are readily given the education and training resources to expand your knowledge exponentially. Most importantly, it is a place with real impact seen in the international headlines and many more untold accomplishments made quietly in the shadows. As a reverse engineer in our firm, you will no longer have to imagine a place like this, because it will become your reality. We have an immediate opportunity for a malware analyst and reverse engineer like you. You will be conducting examinations and analysis of emerging nefarious technologies and previously unknown malicious exploits. You will have access to industry leading tools and optimized technical environments. All while working alongside colleagues and clients united in their efforts to ensure our nation's security. Are you ready to make a difference and accelerate your technical development

Requirements

  • 5+ years of experience with functional testing
  • Experience with analyzing malicious code exemplars
  • Experience with software development, including reading assembly code
  • Experience with tools, including Ida Pro, Ghidra, and Olly Debug
  • Experience with providing both dynamic and static analysis
  • Experience with working independently or under limited direction or guidance
  • Knowledge of Windows API calls
  • TS/SCI clearance with a polygraph
  • Bachelor's degree

Nice To Haves

  • Experience with using issue and project tracking software
  • Experience with Agile development methodologies
  • Experience with the project management framework
  • Ability to manage and prioritize multiple tasks simultaneously
  • Possession of excellent oral and written communication skills, including writing and maintaining technical documents

Responsibilities

  • Conducting examinations and analysis of emerging nefarious technologies and previously unknown malicious exploits.
  • Decompiling malicious code.
  • Spotting "evil" and not falling for deceptive code.
  • Removing obfuscation.
  • Decrypting strings.
  • Identifying command-and-control links.
  • Finding functions.
  • Determining the compiler language used to make the malware.
  • Analyzing malicious code exemplars.
  • Providing dynamic and static analysis.
  • Working independently or under limited direction or guidance.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service