Find your next role

Discover amazing opportunities across our network of companies committed to gender equality in the workplace.

Senior Malware Reverse Engineer

IBM

IBM

quezon, philippines
Posted on Feb 26, 2026
Introduction

In this role, you'll work in one of our IBM Consulting, where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. The IBM X-Force Threat Intelligence (XFTI) team provides expert malware and threat analysis to customers globally. As a Malware Reverse Engineer, you will deliver cutting-edge technical analysis and research, generating actionable threat intelligence to empower organizations against advanced and emerging cyber threats, significantly reducing their attack surface.

Your role and responsibilities

As a X-Force Malware Reverse Engineer, you will support advanced cyber threat analysis and incident response operations. In this role, you will perform deep technical research on malicious software, uncovering functionality and intent to strengthen detection and response capabilities. You will work closely with IBM X-Force Threat Intelligence and Incident Response teams to deliver high‑impact, actionable insights. Your primary responsibilities will include:

  • Perform expert-level reverse engineering of malware across multiple platforms, analyzing command‑and‑control behavior, communication protocols, encryption methods, persistence mechanisms, and exploit techniques.
  • Provide advanced technical analysis and threat research to support X‑Force Threat Intelligence and Incident Response teams, contributing detailed insights during active cyber incidents.
  • Develop comprehensive threat models by correlating malware findings with IBM’s proprietary telemetry, open‑source intelligence, and industry threat data. Derive and validate Indicators of Compromise (IOCs) from incident artifacts and malware samples.
  • Support incident response efforts with timely, actionable intelligence and recommendations based on in‑depth malware and threat analysis.
  • Create automation scripts, primarily in Python, to streamline malware unpacking, configuration extraction, data parsing, IOC generation, and overall analysis workflow efficiency.
Required education
Bachelor's Degree
Preferred education
Master's Degree
Required technical and professional expertise
  • Advanced Malware Reverse Engineering: Experienced in malware reverse engineering and demonstrated expert-level proficiency in advanced malware analysis techniques. This includes manual and automated unpacking of packed/obfuscated executable, rootkit analysis, dissecting complex exploit chains, bypassing sophisticated anti-analysis/evasion mechanisms, and reconstructing malware logic from highly optimized assembly code.
  • Programming & Scripting Expertise: Expertise in at least one high-level programming language (e.g., Python, C, C++, Go) for developing analysis tools, automating tasks, scripting debuggers, and parsing complex data structures (e.g., malware configuration blocks, network protocols, cryptographic key values).
  • Debugging & Disassembly Tools: Extensive hands-on experience with industry-standard debugging and disassembling tools (e.g., IDA Pro, Ghidra, x64dbg, WinDbg, GDB) for static and dynamic malware analysis, including advanced debugging techniques, scriptable breakpoints, and process injection/hooking.
  • Assembly Language Proficiency: Deep, demonstrable expertise in assembly language (x86/x64/ARM/ARM64) and processor architectures, with the ability to swiftly comprehend low-level code, decipher malware behavior, and identify vulnerabilities or exploit mechanisms.
  • Signature Development: Proven ability to develop high-fidelity signatures and rules for threat detection and research, including YARA rules, network-based signatures (e.g., Snort/Suricata), and behavioral indicators, to effectively identify and track malware families and activities.
Preferred technical and professional experience
  • Malware Platform Breadth: Experience analyzing a wide range of malware file types, including Windows PE, ELF (Linux), MacOS binaries, and mobile platforms (Android/iOS).
  • Forensic Artifact Analysis: Proficient in analyzing diverse forensic artifacts, including file system data, system logs, network packet captures, registry hives, and memory dumps, to reconstruct infection chains and and malware activity.
  • Malicious Document Analysis: Experience with analyzing malicious documents (e.g., Office macros, PDF exploits) and understanding associated exploitation techniques.
  • Operating System Internals: Deep working knowledge of various Operating Systems (Windows internals, macOS, Linux) and processor architectures (x86, x64, ARM, ARM64) relevant to malware execution.
  • Threat Intelligence Collaboration: Experience supporting incident response partners, managed security, or threat intelligence teams, and clearly and concisely presenting complex malware analysis findings through high-quality written reports and oral briefings for diverse technical and non-technical audiences.
  • Automated Sandbox Familiarity: Familiarity with automated sandbox technologies for dynamic malware analysis (e.g., Cuckoo Sandbox, VMRay, Any.Run).

ABOUT BUSINESS UNIT

IBM Consulting is IBM’s consulting and global professional services business, with market leading capabilities in business and technology transformation. With deep expertise in many industries, we offer strategy, experience, technology, and operations services to many of the most innovative and valuable companies in the world. Our people are focused on accelerating our clients’ businesses through the power of collaboration. We believe in the power of technology responsibly used to help people, partners and the planet.

YOUR LIFE @ IBM

In a world where technology never stands still, we understand that, dedication to our clients success, innovation that matters, and trust and personal responsibility in all our relationships, lives in what we do as IBMers as we strive to be the catalyst that makes the world work better.

Being an IBMer means you’ll be able to learn and develop yourself and your career, you’ll be encouraged to be courageous and experiment everyday, all whilst having continuous trust and support in an environment where everyone can thrive whatever their personal or professional background.

Our IBMers are growth minded, always staying curious, open to feedback and learning new information and skills to constantly transform themselves and our company. They are trusted to provide on-going feedback to help other IBMers grow, as well as collaborate with colleagues keeping in mind a team focused approach to include different perspectives to drive exceptional outcomes for our customers. The courage our IBMers have to make critical decisions everyday is essential to IBM becoming the catalyst for progress, always embracing challenges with resources they have to hand, a can-do attitude and always striving for an outcome focused approach within everything that they do.

Are you ready to be an IBMer?

ABOUT IBM

IBM’s greatest invention is the IBMer. We believe that through the application of intelligence, reason and science, we can improve business, society and the human condition, bringing the power of an open hybrid cloud and AI strategy to life for our clients and partners around the world.

Restlessly reinventing since 1911, we are not only one of the largest corporate organizations in the world, we’re also one of the biggest technology and consulting employers, with many of the Fortune 500 companies relying on the IBM Cloud to run their business.

At IBM, we pride ourselves on being an early adopter of artificial intelligence, quantum computing and blockchain. Now it’s time for you to join us on our journey to being a responsible technology innovator and a force for good in the world.

IBM is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, neurodivergence, age, or other characteristics protected by the applicable law. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.

OTHER RELEVANT JOB DETAILS

For additional information about location requirements, please discuss with the recruiter following submission of your application.