Reverse Engineer 3

Annapolis Junction, Maryland


Wyetech is a computer engineering services company that is dedicated to providing high quality talent to solve our nation’s toughest problems. At Wyetech, we offer years of experience providing software services and solutions specializing in...

View company page

Perform technical analysis of malicious binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis, in order to ascertain functionality, capability, call-backs, assist with attribution to adversary infrastructure, and identification of indicators of compromise. Provide information and documentation that enables malware detection, signature creation, and mitigation.

Required Qualifications

  • TS/SCI w/client level poly 
  • Doctoral degree with 4 years of relevant experience
  • Master’s degree with 6 years of relevant experience
  • Bachelor’s Degree with 4 years of relevant experience
  • Associates degree with 10 years of relevant experience
  • Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university. 

Required Technical Skills

  • Relevant experience must be in malware reverse engineering.  
  • CISSP, GIAC GREM or CREA Certification is required.
  • Information Assurance Certification may be required 
Wyetech, LLC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: CISSP Computer Science GIAC GREM Malware Reverse engineering TS/SCI

Region: North America
Country: United States
Job stats:  5  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.