As a Malware Reverse Engineer, you will analyze malicious binaries, conduct malware research, and collaborate with threat detection teams to enhance cybersecurity measures.
Available Locations: Mexico City, London, and India
About the Team
Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state sponsored advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of leveraging an incredibly vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to analyze these unique data points, at massive scale and efficiency, synthesizing findings into actionable threat intelligence to better protect our customers.
About the Role
Cloudflare is a system spanning the globe, on a mission to make the internet better, safer, and more powerful everyday. To help fulfill this mission, we are seeking a talented Malware Reverse Engineer to join us in growing our Cloudforce One Organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and ever-evolving global threat actors. This position requires an innovative, self-starting, and detail-oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by sophisticated cyber threats.
As a Cloudforce One Reverse Engineer, you will analyze malicious binaries with the goal of monitoring and disrupting cyber threat activity across multiple platforms, supporting both client requests and proactive internal research. You will serve an integral role in the discovery and analysis of cyber threat adversaries, working along side detection engineers to detect attacks and threat researchers to track them. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing and ever-evolving cyber attacks to protect our global customer base. Lastly, you will help expand our malware lab environment so that we may modernized and scale our operations to streamline malware analysis within Cloudflare.
Our ideal candidate will have 7+ years of previous experience reverse engineering malware samples and can write reliable code, preferably in Python or Golang. Top candidates will have extensive experience with hands on static and dynamic analysis of common file formats on Windows, macOS, or UNIX-based platforms. We also would like our candidates to have experience writing code to process malware samples and interacting with APIs. As a member of the team you will be responsible for contributing to and deploying team codebases to coalesce traits of an attack. Outstanding candidates will also posses excellent verbal and written communication skills to facilitate dialogue with the Threat Research Team for reporting on malware and malware families. You will also work both as a self-driven individual contributor and alongside a team to achieve a common goal.
Examples of desirable skills, knowledge and experience
Bonus Points
Compensation
Compensation may vary based on location and level. This role is eligible to participate in Cloudflare's equity (RSU) program.
Mid Level 3
About the Team
Cloudforce One is Cloudflare's threat operations and research team, responsible for identifying and disrupting cyber threats ranging from sophisticated cyber criminal activity to nation-state sponsored advanced persistent threats (APTs). Cloudforce One works in close partnership with external organizations and internal Cloudflare teams, continuously developing operational tradecraft and expanding ever-growing sources of threat intelligence to enable expedited threat hunting and remediation. Members of Cloudforce One are at the helm of leveraging an incredibly vast and varied set of data points that only one of the world's largest global networks can provide. The team is able to analyze these unique data points, at massive scale and efficiency, synthesizing findings into actionable threat intelligence to better protect our customers.
About the Role
Cloudflare is a system spanning the globe, on a mission to make the internet better, safer, and more powerful everyday. To help fulfill this mission, we are seeking a talented Malware Reverse Engineer to join us in growing our Cloudforce One Organization, where you will be instrumental in building a proactive and threat intelligence-driven approach to protecting Cloudflare and its customers from sophisticated and ever-evolving global threat actors. This position requires an innovative, self-starting, and detail-oriented problem solver with a passion for analyzing, tracking, and triaging the malicious software used by sophisticated cyber threats.
As a Cloudforce One Reverse Engineer, you will analyze malicious binaries with the goal of monitoring and disrupting cyber threat activity across multiple platforms, supporting both client requests and proactive internal research. You will serve an integral role in the discovery and analysis of cyber threat adversaries, working along side detection engineers to detect attacks and threat researchers to track them. The findings you uncover will help identify Tactics, Techniques, and Procedures (TTPs) of ongoing and ever-evolving cyber attacks to protect our global customer base. Lastly, you will help expand our malware lab environment so that we may modernized and scale our operations to streamline malware analysis within Cloudflare.
Our ideal candidate will have 7+ years of previous experience reverse engineering malware samples and can write reliable code, preferably in Python or Golang. Top candidates will have extensive experience with hands on static and dynamic analysis of common file formats on Windows, macOS, or UNIX-based platforms. We also would like our candidates to have experience writing code to process malware samples and interacting with APIs. As a member of the team you will be responsible for contributing to and deploying team codebases to coalesce traits of an attack. Outstanding candidates will also posses excellent verbal and written communication skills to facilitate dialogue with the Threat Research Team for reporting on malware and malware families. You will also work both as a self-driven individual contributor and alongside a team to achieve a common goal.
Examples of desirable skills, knowledge and experience
- Possess mid-level experience as a Malware Analyst able to reverse engineer various file formats and analyze complex malware samples.
- Reverse engineering experience with APT malware with an understanding of common infection vectors.
- Perform system analysis using best practice malware analytics methodologies on Windows, macOS, or UNIX/Linux platform.
- Understanding of source code, hex, binary, regular expression, data correlation, and analysis such as network flow and system logs.
- Practical malware analysis experience with static, dynamic, and automated malware analysis techniques.
- Knowledgeable of current malware techniques to evade detection and obstruct analysis.
- Experience with network protocol analysis and cryptography
- Proficient in Python or Golang, capable of writing modular code that can be installed on a remote system
- Capable of updating analysis VMs and contributing to an analysis framework
- Contributions to enhancing collaborative malware analysis tools
- Experience writing malware reports on unique and interesting aspects of malware
- Experience with malware attribution
- Proficient with Yara and writing rules to detect similar malware samples
- Prior Government experience in malware tracking, analysis, and reporting
Bonus Points
- Experience with tracking and identifying threats through Indicator of Compromising (IOCs) pivoting and infrastructure enumeration
- A conceptual understanding of how attackers conduct operations in regards to the MITRE Cyber Kill Chain
- Familiarity with bash command line executables to conduct static analysis and investigate IOCs.
Compensation
Compensation may vary based on location and level. This role is eligible to participate in Cloudflare's equity (RSU) program.
Mid Level 3
- London estimated salary: 88,000 - 108,000 (Local London currency)
- Mexico estimated salary: 892,000 - 1,090,000 (Local Mexico currency)
- India estimated salary: 3,420,000 - 4,180,000 (Local India currency)
Top Skills
Go
Python
Yara
Cloudflare London, England Office
Riverside Building, 6th Floor, County Hall/The, Belvedere Rd, London, United Kingdom, SE1 7PB
Similar Jobs at Cloudflare
Cloud • Information Technology • Security • Software • Cybersecurity
As a Senior Systems Engineer, you will architect and build high-performance communication protocols, ensuring system reliability, performance optimization, and cross-team collaboration.
Top Skills:
PrometheusRust
Cloud • Information Technology • Security • Software • Cybersecurity
Design, build, and maintain scalable software systems for global network services. Develop high-performance networking code and collaborate across teams for security and performance solutions.
Top Skills:
Cloud TechnologiesDnsFirewallsGoHTTPLinuxProxyingQuicRustTcp/IpUdpVirtualization PlatformsVpns
Cloud • Information Technology • Security • Software • Cybersecurity
As a Systems Engineer, you'll design and scale Cloudflare Browser Isolation, working on remote browsing technology, optimization, and contributing to a secure Internet experience.
Top Skills:
C++ChromiumCloudflare WorkersConsulGoNomadSkiaTypescriptWebassemblyWebglWebrtc
What you need to know about the London Tech Scene
London isn't just a hub for established businesses; it's also a nursery for innovation. Boasting one of the most recognized fintech ecosystems in Europe, attracting billions in investments each year, London's success has made it a go-to destination for startups looking to make their mark. Top U.K. companies like Hoptin, Moneybox and Marshmallow have already made the city their base — yet fintech is just the beginning. From healthtech to renewable energy to cybersecurity and beyond, the city's startups are breaking new ground across a range of industries.

