Malware Analyst / Reverse Engineer

Full Time
San Francisco, CA
Areas of Interest: Exploitation Analysis, Threat Analysis, Vulnerability Assessment and Management
report a problem
Virtual / Telecommute
Remote work is frequently a way to describe working from a home office or being a telecommuter. Depending on the job and company, remote work offers the ability to work from anywhere in the world. To do a remote job, professionals need access to tools like phone/internet service and a quiet place to work without distraction.
Do you have strong programming skills?
Are you experienced in malware analysis or reverse engineering?
Are you looking for an opportunity to collaborate with an industry-leading team?
Then the FireEye Labs Advanced Reverse Engineering (FLARE) Team is looking for you!
As a reverse engineer working within FLARE you will dissect attacker tools and backdoors in support of incident responders. You will also help develop innovative tools to aid other business lines and automate malware analysis and reverse engineering efforts.
Note that this position can be supported from any of the following office locations: Reston, VA; New York, NY; San Francisco, CA; Dallas, TX; Albuquerque, NM; or remotely for well-qualified candidates. 


  • Analyze executables and malicious files 
  • Collaborate with a team of experienced malware analysts and researchers
  • Develop novel solutions to challenges facing incident responders and malware analysts
  • Support the company’s research and development efforts


  • Strong programming skills
  • Ability to analyze disassembly of x86 and x64 binaries
  • Knowledgeable in the use of:
    • IDA Pro disassembler
    • User- and kernel-mode debuggers
    • Common binary file formats
    • Dynamic analysis tools
    • Network analysis tools
  • Ability to reverse engineer binaries of various types including:
    • C/C++
    • Delphi
    • NET
    • Flash
    • Compiled VBScript
  • Ability to analyze shellcode
  • Understanding of software exploits
  • Ability to analyze packed and obfuscated code
  • Capable of Python scripting to automate analysis tasks
  • Experience developing scripts to decode obfuscated data and network communications
  • Experience developing applications in C, C++, and .NET
  • Thorough understanding of network protocols
  • Capable of identifying host- and network-based indicators
  • Experience mitigating anti-reverse engineering techniques

Additional Qualifications

  • BS or MS in Computer Science or Computer Engineering preferred
FireEye is an Equal Opportunity Employer:  All qualified applicants will receive consideration for employment without regard to race, sex, color, religion, national origin, protected veteran status, or on the basis of disability.  Click here to view the full EEO/AA statement.

Share this job:


Join the team.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 3,100 customers across 67 countries, including over 200 of the Fortune 500.
Visit FireEye's Social Media pages:
Company Industry: Computer & Network Security
Company Type: Public Company
Company Size: 1,001-5000