Principal Malware Analyst, Cyber Risk

CDMX, Mexico

Kroll

As the leading independent provider of risk and financial advisory solutions, Kroll leverages our unique insights, data and technology to help clients stay ahead of complex demands. Click for more details.

View all jobs at Kroll

Apply now Apply later

In a world of disruption and increasingly complex business challenges, our professionals bring truth into focus with the Kroll Lens. Our sharp analytical skills, paired with the latest technology, allow us to give our clients clarity—not just answers—in all areas of business. We embrace diverse backgrounds and global perspectives, and we cultivate diversity by respecting, including, and valuing one another. As part of One team, One Kroll, you’ll contribute to a supportive and collaborative work environment that empowers you to excel. 

At Kroll, your work will help deliver clarity to our clients’ most complex governance, risk, and transparency challenges. Apply now to join One team, One Kroll. 

RESPONSIBILITIES:

  • Conduct in-depth malware analysis and reverse engineering
  • Clearly communicate technical findings to a variety of clients and internal stakeholders
  • Assist in ongoing research, development, and testing of enhanced malware analysis techniques, processes, and procedures
  • Collaborate across multiple service lines including digital forensics / incident response, managed services, expert witness, and threat intelligence
  • Support the development of proposals, statements of work, and new business opportunities

REQUIREMENTS:

  • Bachelor’s degree required; Master’s degree or similar advanced degree is preferred
  • 5 years+ of relevant work experience in malware analysis and reverse engineering
  • Low level understanding of Windows operating system architecture fundamentals (NTFS, registry, processes, binaries, DLL’s, etc.) and administration. Similar understanding of MacOS and/or Linux a plus
  • Experience with and understanding of common malware behavior and persistence mechanisms
  • Proficient in various languages such as: Python, PowerShell, x86/x64/ARM Assembly, .NET, Go, C/C++/C#, Java, JavaScript
  • Proficient in malware analysis and RE tools such as: Ghidra, IDA, x64dbg/x32dbg, WinDbg
  • Proficient in a variety of code analysis and reverse engineering analysis tools and techniques, such as debugging, decompiling, and disassembling
  • Understanding of information security basics especially in the realm of security incident response
  • Strong team, project, and client management experience
  • Strong written and verbal communication skills
  • Flexible team player, with strong interpersonal skills
  • Relevant cyber security certifications including GREM, GXPN, GCFA a plus
  • Ability to travel up to 25% as required to support response activities

In order to be considered for a position, you must formally apply via careers.kroll.com. 

Kroll is committed to equal opportunity and diversity, and recruits people based on merit.

#LI-CN1

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  13  0  0

Tags: C Code analysis Forensics GCFA Ghidra Governance GREM GXPN Incident response Java JavaScript Linux MacOS Malware PowerShell Python Reverse engineering Threat intelligence Travel WinDbg Windows

Region: North America
Country: Mexico

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.