Principal Malware Analyst, Cyber Risk

Manila, Philippines

Kroll

As the leading independent provider of risk and financial advisory solutions, Kroll leverages our unique insights, data and technology to help clients stay ahead of complex demands. Click for more details.

View all jobs at Kroll

Apply now Apply later

Working within our Cyber Risk Team as an Associate/Principal Malware Analyst. The focus of this role is to Conduct in-depth malware analysis and reverse engineering Clearly communicate technical findings to a variety of clients and internal stakeholders.

Below are the roles and responsibilities for the Principal Malware Analyst, Cyber Risk role based in India/Philippines/Mexico:

 

Day to day responsibilities

  • Conduct in-depth malware analysis and reverse engineering.
  • Clearly communicate technical findings to a variety of clients and internal stakeholders
  • Assist in ongoing research, development, and testing of enhanced malware analysis techniques, processes, and procedures.
  • Collaborate across multiple service lines including digital forensics / incident response, managed services, expert witness, and threat intelligence.
  • Support the development of proposals, statements of work, and new business opportunities.

 

Essential Traits

  • Proficient in various languages such as: Python, PowerShell, x86/x64/ARM Assembly, .NET, Go, C/C++/C#, Java, JavaScript
  • Proficient in malware analysis and RE tools such as: Ghidra, IDA, x64dbg/x32dbg, WinDbg
  • Proficient in a variety of code analysis and reverse engineering analysis tools and techniques, such as debugging, decompiling, and disassembling.
  • Understanding of information security basics especially in the realm of security incident response
  • Strong team, project, and client management experience
  • Strong written and verbal communication skills
  • Flexible team player, with strong interpersonal skills
  • Relevant cyber security certifications including GREM, GXPN, GCFA a plus.
  • Ability to travel up to 25% as required to support response activities.

 

Prerequisites

  • Bachelor’s degree required; master’s degree or similar advanced degree is preferred.
  • 10 years+ overall experience & 5 years+ of relevant work experience in malware analysis and reverse engineering
  • Low level understanding of Windows operating system architecture fundamentals (NTFS, registry, processes, binaries, DLL’s, etc.) and administration. Similar understanding of MacOS and/or Linux a plus
  • Experience with and understanding of common malware behavior and persistence mechanisms.

 

About Kroll

Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll. 

Kroll is committed to equal opportunity and diversity, and recruits people based on merit. 

In order to be considered for a position, you must formally apply via careers.kroll.com.

 

#LI-IW1

 

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  9  0  0

Tags: C Code analysis Forensics GCFA Ghidra GREM GXPN Incident response Java JavaScript Linux MacOS Malware PowerShell Python Reverse engineering Threat intelligence Travel WinDbg Windows

Perks/benefits: Career development Flex hours

Region: Asia/Pacific
Country: Philippines

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.