Reverse Engineer / Malware Analyst

Reverse Engineering and Malware Analysis disassembles and examines binaries determining intended malicious intentions, impact, and potential countermeasures.

Role overview

Reverse Engineers, also known as Malware Analysts, use decompiling, disassembling, and de-obfuscating to gain a deeper understanding of how and what a malicious software operates. They identify, examine, and understand various forms of malicious software, such as adware, bots, rootkits, spyware, ransomware, Trojan horses, viruses, and worms.

Reverse Engineers
may also be referred to as:
Malware Analyst
Malware Reverse Engineer
Mobile Applications Software Reverse Engineer

Career Path

Map your career path by understanding role relationships

Average Salary

Based upon experience, salary for this role ranges from:
National Average


Analyzing malware samples to support ongoing investigations.
Working with the incident response team to disassemble, deconstruct, and reverse engineer malicious code to allow the organization to protect against similar attacks in the future.
Conducting reverse engineering by disassembling software.
Developing threat detection tools and methods for use in hunt and incident response activities.
Researching and developing tracking methods and detecting malicious activity within a network.
Compiling malware intelligence and research to present to business leaders and stakeholders.
Staying up to date on the latest malware and keeping software updated to defend against it.
Writing alerts to keep the security team informed on attacks.

Tools & Environment

Reverse Engineers, or Malware Analysts, use debugging tools regularly, including IDA Pro, WinDbg, OllyDbg, or Immunity Debugger. They also need to be able to use the relevant tools to reconstruct unknown formats, data structures, and unknown TCP/IP protocols, as well as scripting and coding tools.


[cyber_job_role_count] Reverse Engineer / Malware Analyst jobs



Watch our latest videos, talks an recorded events

White Papers

Download our whitepapers and printed resources

Free Courses

Browse our training courses and educational resources
See All


Listen to our podcast features and recorded roundtables

The CyberSN™ Provider Exchange

The training courses, services, products, and DEI providers you need to take control and accelerate your success.


Get in touch to see your product, training course, service, or DEI support on our provider exchange.

Cyber Security Cloud & SaaS Solutions Outfitter

Invest in Turbo Charging Cyber Security Solutions – Faster Incident Detection, Response and Recovery Times – Get Access To Over 100 New and Emerging Cloud and Cyber Security Software Solutions

Cybersecurity, Risk Management, Continuity of Operations, and Data Protection & Governance

You need expertise to help you manage risk and protect your data from cyber attacks. Whether it’s strategy, cloud security, compliance, or anything in between, Vertex11 is your ultimate resource for getting the job done.
ESCALATE | Point3 Security

Identify Highly Skilled Individuals with ESCALATE Talent Screening

Traditional hiring has a couple of flaws. Human biases prevent good hires. Over-reliance on certifications and years of experience & HR Software and AI often removes top performers. With ESCALATE Talent Screening, your candidates physically demonstrate necessary skills, informing your hiring process far beyond certs or years of experience.
Rapid Ascent, Inc

Ascend with a Career in Cybersecurity

Hands-on, on-the-job training using state-of-the-art AI, gamified live-fire threats with real-world projects, and coaching from industry experts.

A Cybersecurity SaaS Ecosystem

CYRISMA combines Data Discovery/Data Loss Prevention, Vulnerability Scanning, Configuration Hardening, Score Card Evaluation, Various Reporting and Mitigation planning and Mitigation Execution in a single web-based platform generating Monthly Recurring Revenue for the MSSP.

Get our latest insights. Subscribe to our newsletter.