Lead Malware Reverse EngineerLeidos
Description
The Homeland Sector has an immediate opening for a Lead Malware Reverse Engineer SME to support our customer’s mission critical malware analysis programs. This position is an exciting opportunity to leverage your technical skills and support the nation’s defensive cyber operations supporting malware detection and defeat as well as reverse engineering. If you are looking to join and lead a team of the best cybersecurity professionals in the industry supporting our nation’s front line of defense against cyber threats, this is the job for you.
Primary Responsibilities
The Lead Malware Reverse Engineer SME will be responsible for the performance of the work and provide overall direction to Malware Reverse Engineer personnel working under this contract including:
End-to-end processing of submissions, ingest and triage, ticket creation and prioritization, task assignments, progress tracking and reporting, established Standard Operation Procedures (SOPs) and guidance derived from Playbooks
Overseeing the production process to ensure products are high quality and published in a timely manner.
Informing leadership when issues or anomalies arise, recommends corrective actions and providing updates and briefs to leadership as required.
Basic Qualifications
Minimum of 10 years of specialized experience in advanced level cybersecurity analytics, cyber threat research, coding and reverse engineering.
Active TS/SCI clearance
Experience with application security, network security, programming (assembly and web), obfuscation, and encryption techniques in addition to experience and innovation in developing tools and guidance on analysis techniques.
Proven ability to effectively manage a technical analysis team in a dynamic mission environment, watch floor ops or joint mission operational application.
Advanced ability of critical thinking, problem solving, and team coordination against multiple mission needs simultaneously.
Expertise in evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers.
Ability to conduct research in malicious software, vulnerabilities, and exploitation tactics at an advanced level.
Advanced experience in developing mitigation strategies based on malware threats and actor TTPs, to include YARA and SIGMA rules experience with application security, network security, programming (assembly and web), obfuscation, and encryption techniques.
Experience and innovation in developing tools and guidance on analysis techniques.
Expertise in technical, executive reporting and production management that provides customers with informed decision-making solutions
Bachelor’s Degree or equivalent experience
Preferred Qualifications
CISA or DHS cybersecurity experience as a technical SME
Cybersecurity technical experience in the areas of Advanced Persistent Threat (APT) analysis, YARA rule crafting, or developing and maintaining a secure analysis environment
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo — because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 — and moving faster than anyone else dares.
Original Posting:
January 30, 2026For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
