The role includes training in malware analysis and detection and provides exposure to various malware threats and techniques. Researchers will combine technical and intelligence findings to reach accurate verdicts and assist in the bulk removal of malicious applications. The position requires adaptability and proactive identification of emerging malware trends.
We are seeking candidates who are willing to learn, can perform effectively under pressure, and maintain high professional standards.
Must-Have:
2 years of proven experience in the industry in one of the following: malware research, reverse engineering, penetration testing, or software development
Strong understanding of Java object-oriented programming.
Ability to trace execution flow through code analysis.
Comprehensive knowledge of cybersecurity, networking, and programming fundamentals.
Proficient English communication skills (reading and writing).
Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction.
Nice-to-Have:
Computer Science degree.
Proficiency in multiple programming languages (e.g., JavaScript, C/C++).
Experience with disassemblers such as IDA Pro or Ghidra.
Experience with decompilers such as JADX or JEB.
Familiarity with instrumentation frameworks like Frida or Xposed.
Experience with HTTP debugging and network analysis tools (e.g., Fiddler, HTTP Toolkit, Burp Suite, Wireshark).
Knowledge of common malware threats and techniques












