🔔 FCM Loaded

Malware Analyst

LTIMindtree

8 - 10 years

Hyderabad

Posted: 12/02/2026

Getting a referral is 5x more effective than applying directly

Job Description

Role: Senior Malware Researcher (58 Years)

Job Summary/ Role Overview

We are looking for a Senior Malware Researcher with strong expertise in static and dynamic malware analysis to support advanced threat detection and malware intelligence initiatives. This Role requires hands-on experience in malware investigation, signature development, and threat categorization.

The ideal candidate will act as a subject matter expert (SME), contributing to analysis accuracy, malware categorization, and overall detection quality

Key Responsibilities

  • Perform indepth static and dynamic analysis of malware samples, binaries, scripts, and suspicious applications across multiple platforms
  • Analyze malware execution behavior using sandboxing, debugging, and behavioral monitoring techniques
  • Advanced reverse engineering skills (Windows malware, x86/x64)
  • Develop, tune, and validate signatures for malware detection and classification
  • Conduct advanced malware reverse engineering to understand payload behavior, infection vectors, persistence techniques, and commandandcontrol mechanisms.
  • Provide clear verdicts and categorization of files and applications (Malicious, Benign, Grayware, PUA, etc.) based on evidence
  • Create highquality technical documentation, analysis reports, and investigation notes to support SOC, detection, and engineering teams
  • Stay updated on emerging malware families, threat actor techniques, evasion methods, and industry trends

Mandatory Technical Skills

  • 58 years of experience in malware research or threat analysis

Strong understanding of:

  • Malware types (Trojans, Downloaders, Ransomware, Droppers, Loaders)
  • Obfuscation, antidebugging, and evasion techniques

Handson experience with tools such as IDA Pro / Ghidra, x64dbg, Cuckoo Sandbox, ProcMon, Wireshark

Or

Proven experience with malware analysis and reverse engineering tools such as:

  • Disassemblers/Decompilers: IDA Pro, Ghidra, Radare2
  • Debuggers: x64dbg, WinDbg, OllyDbg
  • Sandboxing/Behavioral Tools: Cuckoo Sandbox, Joe Sandbox
  • Analysis Utilities: PEStudio, ProcMon, Regshot, Wireshark


  • Good understanding of malware signatures, heuristics, and behaviorbased detection
  • Strong documentation and communication skills


Preferred Skills

  • Experience with AI/MLdriven malware detection techniques, including behaviorbased and anomalybased analysis
  • Experience combining signaturebased, heuristic, and AIbased detections to improve overall accuracy
  • Scripting or automation experience using Python, PowerShell, or similar languages
  • Familiarity with malware evasion and obfuscation techniques OR Knowledge of evasion techniques targeting AI models and techniques to handle adversarial or obfuscated samples

Services you might be interested in

Improve Your Resume Today

Boost your chances with professional resume services!

Get expert-reviewed, ATS-optimized resumes tailored for your experience level. Start your journey now.