Defensive Cyber Operation Watch Malware Analyst

Sorry, this job was removed at 08:42 p.m. (CST) on Thursday, Feb 19, 2026
Be an Early Applicant
North Charleston, SC, USA
In-Office
Security • Cybersecurity
The Role
Cyber Security Analyst II, DCO Watch Malware Analyst - Tier 3 
North Charleston, SC  
Secret Clearance required to start, with ability to obtain TS/SCI  

 
As a Tier 3 Defensive Cyber Operations (DCO) Watch Malware Analyst, you will serve as a senior subject matter expert responsible for the deep analysis and reverse engineering of malicious code targeting customer networks. This role requires dissecting the most sophisticated threats through advanced static and dynamic analysis of malware samples, including executables, scripts, and weaponized documents. You will leverage tools to deconstruct malware functionality, defeat anti-analysis and obfuscation techniques, and map out command and control (C2) infrastructure. The primary output of this work is the production of actionable intelligence, the creation of robust detection signatures (e.g., YARA), and providing critical expertise to support incident response and threat hunting operations. 
Position Requirements and Duties 
  • Analyze and understand the behavior of malware using dynamic and static reverse engineering techniques. 
  • Produce comprehensive technical reports documenting malware capabilities, mitigation strategies, and recommended defensive actions 
  • Develop and maintain YARA signatures to identify malware families and variants across enterprise environments at scale 
  • Lead incident response efforts, including analysis, mitigation, and reporting of significant incidents per CJCSM 6510.01B 
  • Manage incident response campaigns by developing strategies, coordinating multi-team efforts, and ensuring comprehensive resolution and reporting 
  • Conduct proactive threat hunting to identify advanced threats and vulnerabilities within the network 
  • Lead purple team exercises to evaluate and enhance detection and response capabilities in collaboration with red and blue teams 
  • Evaluate and refine detection mechanisms, including IDS/IPS signatures and log correlation rules, to improve accuracy and reduce false positives 
  • Perform advanced network and host-based digital forensics on Windows and other operating systems to support incident investigations 
  • Coordinate with reporting agencies and subscriber sites to ensure comprehensive analysis and reporting of significant incidents 
  • Develop and maintain internal SOP documentation, ensuring alignment with CJCSM 6510.01B and other directives 
  • Provide 24/7 support for incident response during non-core hours, and mentor junior analysts 
  • Lead program reviews, product evaluations, and onsite certification evaluations 
  • Overtime may be required to support incident response actions (Surge).  
  • Up to 10% travel may be required, may be international  
  • Must maintain a current US Passport 

Minimum Qualifications
  • Bachelor’s Degree in relevant discipline and 3 years or at least 8 years of experience working in a CSSP, SOC, or similar environment 
  • At least 2 years of hands-on experience performing static and dynamic analysis of malware, using tools such as IDA Pro, Ghidra, x64dbg, Wireshark, or Cuckoo Sandbox to determine malware functionality, indicators of compromise (IOCs), and command and control (C2) infrastructure 
  • At least 1 year of experience in reverse engineering, demonstrated by the ability to read and understand disassembled code (e.g., x86/x64 assembly) and decompile code to identify core logic, evasion techniques, and cryptographic functions used by malicious software 
  • Must be a U.S. Citizen  

Desired Qualifications
  • Possess comprehensive knowledge of programming skills: including C/C++, Assembly language, Windows APIs, Golang, Rust, exploit development, and related disciplines 
  • Extensive knowledge in the use of decompilers, debuggers and other standard malware analysis tools 
  • Proficiency in writing custom scripts to automate the analysis of malware, such as de-obfuscating strings, extracting embedded configuration data, or parsing malicious network traffic 
  • Advanced knowledge of malware obfuscation, packing, and evasion techniques; to include bypassing anti-analysis controls such as anti-debugging, anti-VM, or custom encryption 
  • Extensive experience creating detection signatures based on reverse engineering findings; such as YARA rules, Snort/Suricata signatures, or other network or host-based detection logic 
  • Possession of an advanced, reverse engineering focused certification, such as GIAC Reverse Engineering Malware (GREM), Offensive Security Exploit Developer (OSED), or equivalent 
  • Expertise in log aggregation tools (e.g., Splunk, Elastic, Sentinel) for complex correlation analysis  
  • Demonstrated passion for cybersecurity and continuous learning through active participation in Capture the Flag (CTF) events, (e.g., TryHackMe, Hack The Box, etc) 
  • Completion of practical, hands-on cybersecurity training courses or certifications (e.g., Security Blue Team BTL1/BTL2, AntiSyphon training courses, OffSec OSCP) 

Required Certifications 
  • DoD 8570 IAT Level II and CSSP Incident Responder compliant certifications  

 

Similar Jobs

Spectrum Logo Spectrum

Sales Representative

Information Technology • Internet of Things • Mobile • On-Demand • Software
In-Office
Simpsonville, SC, USA
100000 Employees
18-31 Hourly

Spectrum Logo Spectrum

Account Executive

Information Technology • Internet of Things • Mobile • On-Demand • Software
In-Office
Spartanburg, SC, USA
100000 Employees

Pluralsight Logo Pluralsight

Account Executive

Edtech • Information Technology • Software
Remote or Hybrid
USA
1000 Employees
256K-320K Annually

Optum Logo Optum

Medical Assistant - Colonial Healthcare

Artificial Intelligence • Big Data • Healthtech • Information Technology • Machine Learning • Software • Analytics
In-Office
Sumter, SC, USA
160000 Employees
16-29 Hourly
Get Personalized Job Insights.
Our AI-powered fit analysis compares your resume with a job listing so you know if your skills & experience align.

The Company
HQ: North Charleston, SC
90 Employees
Year Founded: 2015

What We Do

Adapt Forward specializes in Defensive and Offensive cyber operations. We strive to rewrite the rulebook on how Cyber Defense and Incident response is done with a unique blend of offense to validate our defense.

Similar Companies Hiring

Oso Thumbnail
Software • Security • Infrastructure as a Service (IaaS)
New York, New York
36 Employees
Credal.ai Thumbnail
Software • Security • Productivity • Machine Learning • Artificial Intelligence
Brooklyn, NY
Milestone Systems Thumbnail
Software • Security • Other • Big Data Analytics • Artificial Intelligence • Analytics
Lake Oswego, OR
1500 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account