Reverse Engineer / Malware Analyst

Reverse Engineering and Malware Analysis disassembles and examines binaries determining intended malicious intentions, impact, and potential countermeasures.

Role overview

Reverse Engineers, also known as Malware Analysts, use decompiling, disassembling, and de-obfuscating to gain a deeper understanding of how and what a malicious software operates. They identify, examine, and understand various forms of malicious software, such as adware, bots, rootkits, spyware, ransomware, Trojan horses, viruses, and worms.

Reverse Engineers
may also be referred to as:
Malware Analyst
Malware Reverse Engineer
Mobile Applications Software Reverse Engineer

Career Path

Map your career path by understanding role relationships

Average Salary

Based upon experience, salary for this role ranges from:
National Average
* based upon those with two plus years of cybersecurity experience


Analyzing malware samples to support ongoing investigations.
Working with the incident response team to disassemble, deconstruct, and reverse engineer malicious code to allow the organization to protect against similar attacks in the future.
Conducting reverse engineering by disassembling software.
Developing threat detection tools and methods for use in hunt and incident response activities.
Researching and developing tracking methods and detecting malicious activity within a network.
Compiling malware intelligence and research to present to business leaders and stakeholders.
Staying up to date on the latest malware and keeping software updated to defend against it.
Writing alerts to keep the security team informed on attacks.

Tools & Environment

Reverse Engineers, or Malware Analysts, use debugging tools regularly, including IDA Pro, WinDbg, OllyDbg, or Immunity Debugger. They also need to be able to use the relevant tools to reconstruct unknown formats, data structures, and unknown TCP/IP protocols, as well as scripting and coding tools.


[cyber_job_role_count] Reverse Engineer / Malware Analyst jobs



Watch our latest videos, talks an recorded events

White Papers

Download our whitepapers and printed resources

Free Courses

Browse our training courses and educational resources
See All


Listen to our podcast features and recorded roundtables

The CyberSN™ Provider Exchange

The training courses, services, products, and DEI providers you need to take control and accelerate your success.
Women Building Careers in Cybersecurity Together

Hackers in Heels

Hacker in Heels is committed to attracting, advancing, and advocating for women in cybersecurity. Through our digital content, career quiz, Changemakers program, and Study Squads Hacker in Heels aims to be the premiere online platform for women in cybersecurity.


Get in touch to see your product, training course, service, or DEI support on our provider exchange.
Mentorship and career connector program

Breaking Barriers - Women in Cybersecurity

A place where existing/new women in the cybersecurity industry can envision to grow as a leader.
Cyber Security Cloud & SaaS Solutions Outfitters

Cyber Buyer

Invest in Turbo Charging Cyber Security Solutions – Faster Incident Detection, Response and Recovery Times – Get Access To Over 100 New and Emerging Cloud and Cyber Security Software Solutions
Get the knowledge you deserve, reserve your time with CyberPreserve

Cyber Preserve

CyberPreserve equips you with the right skills and mindset to help you navigate through your Cybersecurity career.
Cybersecurity Apprenticeship - Find or become the next cyber rockstar


CyberUp finds, prepares, and places amazing candidates with employers ready to elevate their hiring to the next level. Our apprenticeship model provides a roadmap for both to create diversity, equity, and inclusion on your teams.

Get our latest insights. Subscribe to our newsletter.