About The Position

We are looking for a skilled Reverse Engineer to analyze malicious binaries using various methods and determine functionality and indicators of compromise. You will provide information that assists with malware detection and mitigation. Experience with malware reverse engineering is required and expertise with Ghidra and/or IDA Pro is helpful. The Reverse Engineer Level 4 shall possess the following capabilities: Perform technical analysis of malicious binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis, in order to ascertain functionality, capability, call-backs, assist with attribution to adversary infrastructure, and identification of indicators of compromise. Provide information and documentation that enables malware detection, signature creation, and mitigation. Proficiency working with malicious binaries & analysis of assembly code. IOC / APT familiarity and analysis, Malware detection, signature creations (YARA/SNORT) and mitigation required. Ability to support identification of areas of risk and provide mitigation strategies. Computer networking and RE TTP experience is required.

Requirements

  • Malware reverse engineering experience
  • Proficiency working with malicious binaries & analysis of assembly code
  • IOC / APT familiarity and analysis
  • Malware detection
  • Signature creations (YARA/SNORT)
  • Mitigation required
  • Computer networking and RE TTP experience is required
  • Doctoral degree plus 7 years of relevant experience OR Master's degree with 9 years of relevant experience OR Bachelor's Degree with 11 years of relevant experience OR Associates degree with 13 years of relevant experience
  • Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university.
  • Relevant experience must be in malware reverse engineering.
  • CISSP, GIAC GREM or CREA Certification is required
  • TS/SCI with polygraph is required.

Nice To Haves

  • Expertise with Ghidra and/or IDA Pro

Responsibilities

  • Perform technical analysis of malicious binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis, in order to ascertain functionality, capability, call-backs, assist with attribution to adversary infrastructure, and identification of indicators of compromise.
  • Provide information and documentation that enables malware detection, signature creation, and mitigation.
  • Support identification of areas of risk and provide mitigation strategies.
© 2026 Teal Labs, Inc
Privacy PolicyTerms of Service