




**About Group\-IB:** Founded in 2003 and headquartered in Singapore, Group\-IB is a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime. Combating cybercrime is in the company’s DNA, shaping its technological capabilities to defend businesses, and citizens, and support law enforcement operations. Group\-IB’s Digital Crime Resistance Centers (DCRCs) are located in the Middle East, Europe, Central Asia, and Asia\-Pacific to help critically analyze and promptly mitigate regional and country\-specific threats. These mission\-critical units help Group\-IB strengthen its contribution to global cybercrime prevention and continually expand its threat\-hunting capabilities. Each of us can help make the world a safer place. **Join us!** **About the Role:** The Threat Intelligence \& Malware Analyst will join our Cybercrime Research team in LATAM, blending cyber threat research with hands\-on malware analysis and reverse engineering. You’ll be working at the forefront of threat actor tracking, identifying malicious infrastructure, analyzing advanced malware samples, and enriching our threat intelligence data. If you are passionate about cybercrime investigations and dissecting malware to understand how threat actors operate — this role is for you. **Tasks to solve:** *Threat Intelligence Duties* * Monitor and investigate cyber threats using OSINT and proprietary tools. * Track ransomware groups, phishing kits, and fraud campaigns on the dark web and open sources. * Engage threat actors in private communication to collect intelligence and validate attribution hypotheses. * Analyze TTPs and enrich profiles of threat actors, connecting incidents to broader campaigns. * Draft clear and structured threat intelligence reports and respond to RFIs. *Malware Analysis Duties* * Analyze and reverse\-engineer malware samples (e.g., ransomware, stealers, loaders, RATs) to understand functionality and persistence mechanisms. * Unpack obfuscated or packed samples, perform static and dynamic analysis. * Extract IoCs, C2 infrastructure, payload behavior, and attribution clues. * Support incident response teams and contribute technical insights into attack vectors and malware behavior. * Develop internal malware analysis methodologies and contribute to automation scripts or sandbox toolkits. *Shared Responsibilities* * Participate in joint investigations and complex cases with other internal teams. * Maintain and expand internal knowledge base and WIKI. * Automate repetitive workflows or recommend tooling improvements. * Contribute to technical blog posts and external publications. **Qualifications:** * Bachelor’s degree in Computer Science, Information Security, or equivalent. * Strong background in cybersecurity and/or digital forensics. * Proven experience in malware analysis and reverse engineering (IDA Pro, Ghidra, x64dbg, etc.). * Solid understanding of Windows internals and malware execution techniques. * Hands\-on experience with OSINT tools and dark web monitoring platforms. * Familiarity with frameworks such as MITRE ATT\&CK, Cyber Kill Chain. * Ability to write well\-structured technical reports and communicate findings clearly. * **Fluency in English and Spanish OR Portuguese (note that English is required)** * Passion for hunting and disrupting cybercrime. **Why GROUP\-IB?** * **Your happiness is important to us:** We want every single team member to be happy. * **Continuing professional development:** At Group\-IB, you can choose from various paths to growth: progress as an expert, advance to a management position, try your hand in another department, relocate abroad, or launch a new business area. * **Group\-IB.A team with extensive international** expertise: Do you have experience but are looking for exciting challenges? By choosing us, you will be choosing complex tasks and continuously improving your skills in a fast\-growing internationalcompany**.** * **Globally recognized technologies:** Group\-IB's members are located in 25 countries, and our products and services are sold in 60 countries. What’s more, Gartner, IDC, and Forrester have ranked our technologies among the best in their class. We work with over 450 international partners and about 500 clients**.** * **A culture created by each of us:** Group\-IB’s employees speak many different languages and understand one another. We respect each other's beliefs, share common values, and strive toward the happiness of every employee**.** * **Economic stability:** Group\-IB's sustainable growth helps rapidly develop careers that would take years to progress as far as most other companies. **What else should you know:** * **Flexible schedule:** Group\-IB does not have fixed working hours. You choose your schedule. We adhere to the principle advocated by Steve Jobs: “We have to work not 12 hours and head. ” * **Certificates and training courses**: Group\-IB specialists hold over 1,000 professional certificates, including CEH, CISSP, OSCP, GIAC, MCFE, BSI, as well as some rare ones that would be a source of pride for experts in forensics, penetration testing, and reverse engineering worldwide. We have an incentive program that helps employees achieve certifications at the company's expense. * **Challenges:** A wide selection of GIB programs helps you improve soft skills, gain new competencies, and receive monetary rewards. * **The initiative is rewarded:** At Group\-IB, you can bring your most daring ideas to life. The company encourages technical blogging, writing articles, building sports teams, and other creative activities. Job Type: Full\-time Experience: * Malware analysis: 4 years (Required) Language: * Englsih (Required) Work Location: Remote


