Posted at: 15 January
Malware Researcher (Remote)
Company
Cracken
Cracken is an AI-enabled B2B cybersecurity platform headquartered in an undisclosed location, specializing in adversarial exposure validation and security resilience for enterprises globally.
Remote Hiring Policy:
Cracken offers a fully remote and flexible work setup, hiring from various regions to support a diverse team.
Job Type
Full-time
Allowed Applicant Locations
Worldwide
Job Description
Built by ex–nation-state operators and AI researchers, Cracken is the world’s first Uncensored Vibe Hacking platform that safely amplifies security teams and gives enterprises proven, auditable security resilience.
We are expanding globally and seeking a talented Malware Researcher to strengthen our threat intelligence capabilities and enhance our AI Agent's understanding of the evolving malware landscape.
What You'll Do
Malware Research & Analysis:
Perform static and dynamic analysis of malware samples ranging from commodity threats to sophisticated APT campaigns
Conduct reverse engineering of malicious binaries, scripts, and documents using industry-standard tools
Research emerging malware families, attack techniques, and evasion mechanisms (including polymorphic malware)
Track threat actor TTPs and map findings to frameworks like MITRE ATT&CK
Detection & Automation:
Build AI-based automation tools and pipelines for large-scale malware processing and analysis
AI Integration & Research:
Collaborate with AI engineers to integrate malware intelligence into Cracken's agentic framework
Help develop automated malware analysis capabilities within our AI Agent
Intelligence Production:
Produce comprehensive technical reports and threat assessments
Be active in the offensive AI community, sharing insights and staying ahead of adversarial techniques
Present findings to internal stakeholders and contribute to product development
Monitor threat landscape trends and provide strategic threat intelligence insights
Required Skills
Technical Expertise:
5+ years of experience in malware analysis, reverse engineering, or threat research
Knowledge programming languages (C/C++)
Understanding of various operating systems internals (Windows, Linux, macOS, etc.), file systems, processes
Mobile malware analysis experience
Experience with virtualization and sandboxing environments for dynamic analysis
Security Knowledge:
Solid understanding of malware techniques: persistence mechanisms, polymorphic malware, C2 communications, evasion tactics
Knowledge of cryptographic algorithms commonly used by malware
Nice to Have:
Experience with agentic AI in cybersecurity
OSINT and dark web research capabilities
Why Cracken?
Real-world impact: Our technology is validated in nation-state operations and grounded in hands-on internal research
Team with a mission: Ukrainian-heavy international team of PhDs, professors, and top-tier industry veterans, driven by intrinsic motivation shaped by real-world adversity
Adaptive roles: We shape roles around exceptional talent — your ownership and drive will define your path
Perfect timing: Operating at the intersection of AI, cybersecurity, and autonomous systems, Cracken is uniquely positioned to win against sophisticated adversaries
What we offer
Ownership over a core cybersecurity product
Direct collaboration with founders and elite cyber operators
High autonomy and real impact on product direction
Fully remote & flexible work setup
Competitive compensation