JobTarget Logo

Malware Reverse Engineer at Spry Methods – Washington, District of Columbia

Spry Methods
Washington, District of Columbia, 20001, United States
Posted on
Job Function:Engineering

Explore Related Opportunities

About This Position

Malware Reverse Engineer

Who Were Looking For (Position Overview):
Were looking for a Malware Reverse Engineer to perform advanced malware analysis and reverse engineering to determine maliciousness, capabilities, complexity, and attribution-relevant indicators. This role supports mission needs including identifying C2 infrastructure, extracting IOCs, and producing defensible analysis outputs that can support investigative and legal processes.
The ideal candidate is a deeply technical reverse engineer who can work independently on hard problems, rapidly learn unfamiliar techniques, and communicate complex behavior and conclusions in plain language.
What Your Day-To-Day Looks Like (Position Responsibilities):
  • Malware Analysis & Reverse Engineering
  • Conduct static and dynamic analysis of binaries and scripts; reverse engineer across architectures (x86/x64, ARM/ARM64, MIPS, others as needed).
  • Analyze packed/obfuscated/encrypted code; build unpacking/decryption routines where required.
  • Tooling & Tradecraft
  • Use tools such as IDA Pro, Ghidra, Binary Ninja, WinDbg, x64dbg, and related debuggers/disassemblers.
  • Detection Engineering Outputs
  • Extract IOCs; develop YARA rules and behavioral signatures to support detection and mitigation.
  • Identify persistence mechanisms, anti-analysis, and C2 protocols; assess multi-platform malware (Windows, Linux, macOS, mobile, embedded/IoT).
  • Documentation, Briefing & Testimony Readiness
  • Produce thorough documentation of findings and conclusions; communicate clearly to non-expert audiences.
  • Successfully complete a mock examination and defend results in a practical courtroom exercise (Government-run).
  • Operational Support
  • Support taskings that may require extended/irregular hours and location-specific needs depending on operational investigative activity.
What You Need to Succeed (Minimum Requirements):
  • Citizenship & Clearance
  • U.S. Citizenship required.
  • Active TS clearance with SCI eligibility required.
  • Reverse Engineering Expertise
  • Demonstrated hands-on experience with advanced malware reverse engineering across architectures and platforms.
  • Independence & Problem Solving
  • Ability to work independently on complex problems without higher-tier escalation support; self-directed research and rapid learning.
Ideally, You Also Have (Preferred Qualifications):
  • Proficiency in Python/PowerShell/Bash; additional experience in C/C++, Go, or Rust.
  • Familiarity with common malware families and threat actor TTPs; experience building detection content (YARA, behavioral signatures).

Job Location

Washington, District of Columbia, 20001, United States

Frequently asked questions about this position

Latest Job Openings in District of Columbia

Engineer DC 3rd Class in NE Washington, DC

Trademasters Services I
Washington, DC

Registered Nurse

Planned Parenthood of Metropolitan Washington DC
Washington, DC

SharePoint Engineer - Cleared

RightDirection Technology Solutions
Washington, DC

Fire Inspector

Dextera Corporation
Washington, DC
Continue to apply
Enter your email to continue. You’ll be redirected to the employer’s application.
By clicking Continue, you understand and agree to JobTarget's Terms of Service and Privacy Policy.
Apply Now