Malware Analyst
LTIMindtree
8 - 10 years
Hyderabad
Posted: 12/02/2026
Job Description
Role: Senior Malware Researcher (58 Years)
Job Summary/ Role Overview
We are looking for a Senior Malware Researcher with strong expertise in static and dynamic malware analysis to support advanced threat detection and malware intelligence initiatives. This Role requires hands-on experience in malware investigation, signature development, and threat categorization.
The ideal candidate will act as a subject matter expert (SME), contributing to analysis accuracy, malware categorization, and overall detection quality
Key Responsibilities
- Perform indepth static and dynamic analysis of malware samples, binaries, scripts, and suspicious applications across multiple platforms
- Analyze malware execution behavior using sandboxing, debugging, and behavioral monitoring techniques
- Advanced reverse engineering skills (Windows malware, x86/x64)
- Develop, tune, and validate signatures for malware detection and classification
- Conduct advanced malware reverse engineering to understand payload behavior, infection vectors, persistence techniques, and commandandcontrol mechanisms.
- Provide clear verdicts and categorization of files and applications (Malicious, Benign, Grayware, PUA, etc.) based on evidence
- Create highquality technical documentation, analysis reports, and investigation notes to support SOC, detection, and engineering teams
- Stay updated on emerging malware families, threat actor techniques, evasion methods, and industry trends
Mandatory Technical Skills
- 58 years of experience in malware research or threat analysis
Strong understanding of:
- Malware types (Trojans, Downloaders, Ransomware, Droppers, Loaders)
- Obfuscation, antidebugging, and evasion techniques
Handson experience with tools such as IDA Pro / Ghidra, x64dbg, Cuckoo Sandbox, ProcMon, Wireshark
Or
Proven experience with malware analysis and reverse engineering tools such as:
- Disassemblers/Decompilers: IDA Pro, Ghidra, Radare2
- Debuggers: x64dbg, WinDbg, OllyDbg
- Sandboxing/Behavioral Tools: Cuckoo Sandbox, Joe Sandbox
- Analysis Utilities: PEStudio, ProcMon, Regshot, Wireshark
- Good understanding of malware signatures, heuristics, and behaviorbased detection
- Strong documentation and communication skills
Preferred Skills
- Experience with AI/MLdriven malware detection techniques, including behaviorbased and anomalybased analysis
- Experience combining signaturebased, heuristic, and AIbased detections to improve overall accuracy
- Scripting or automation experience using Python, PowerShell, or similar languages
- Familiarity with malware evasion and obfuscation techniques OR Knowledge of evasion techniques targeting AI models and techniques to handle adversarial or obfuscated samples
Services you might be interested in
Improve Your Resume Today
Boost your chances with professional resume services!
Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.
