Professional development

Malware analyst: Is it the career for you?

Kimberly Doyle
May 31, 2021 by
Kimberly Doyle

It’s the role of a malware analyst to reverse-engineer the attacks hackers use to breach systems to best understand how to defend against them.

While cybersecurity is considered an evolving field, one thing never changes: the constant flow of malware. Malware authors are forever creating new attack methods such as viruses, spyware, Trojan Horses and others to steal data and disrupt business. The AV-Test Institute registers over 350,000 new malware programs every day and the global cost of ransomware according to Cybersecurity Ventures is predicted to hit $20 billion this year.

FREE role-guided training plans

FREE role-guided training plans

Get 12 cybersecurity training plans — one for each of the most common roles requested by employers.

If you’re thinking there must be great job security in a career as a malware analyst, you’re right considering the mountain of work that must be done to keep organizations safe.

According to Dr. Richard Ford, chief technology officer at Cyren, malware analysis continues to grow in importance as the volume and seriousness of cyberattacks escalates. What started in the 1990s as a group of people exploring the implications of connecting computers together was closely followed by chaos and then pain, however unintentional it may have been then, to a full-on war between attackers and defenders.

“Today, it’s the difference between joy-riding and axe-murdering,” Ford says. “Nation-states, organized crime and big sums of money are involved.”

What does a malware analyst do?

A malware analyst starts with a piece of malicious software and the goal of understanding what did it do and how did it do it. How was the affected machine(s) impacted and what was the threat vector used to accomplish such an attack? Some may consider the examination of computer code tedious work but for others, the thought of piecing together such an important puzzle brings great reward.

Generally, there are two employment settings for malware analyst careers:

  • Working for a cybersecurity vendor
  • Working for an enterprise security operations team

Both are tasked with reverse-engineering malware to better defend against it in the future. An industry vendor malware analyst will focus on how to create solutions that automate stopping the attack for the benefit of the company’s customers. An in-house malware analyst will work to build defenses against the malware too, but they are also concerned about overall business impact and long-term strategies to bolster their company’s security.

How to become a malware analyst 

Malware analysts often write signatures to identify “known” malware and add that signature to a database that becomes the fuel for anti-malware defenses. “They start off by writing a lot of signatures,” Ford says. “As they progress in their career, they begin to look at detection techniques that fit well with specific families of malware,” for more advanced protection.

As malware analyst skills evolve, they work with the rest of the security team on what was the impact to the organization’s network and how they can proactively detect the larger malware group before it hits the company’s system.

To isolate and investigate malware, malware analysts use a variety of forensic tools that weren’t available in the early days of malicious software. This is particularly helpful today as the complexity levels continue to increase. “Back in the day, you had to create your own tools because essentially, you need to draw a border around the malware,” Ford says. “But pieces of malware now reach out and pull-down updates through an online command and control making them dynamic. They morph and they monetize — things are crazy complicated today.”

What skills do good malware analysts have in common?

Many senior malware analysts today don’t have computer science degrees — they were university students in the era of math, physics and the like. Today, computer science degrees will help, but according to Ford, they aren’t always required if you’re looking to get your foot in the door. On-the-job training is common, particularly with the rate at which malware and forensic tools evolve.

Malware analysis is a lot like solving puzzles so curious, persistent people do well. In the spirit of effective problem solving, the willingness to take initiative is also a valuable skill in this field. In the absence of these characteristics, the role may be frustrating.

“It isn’t CSI; you’re not a super cyber sleuth all the time,” Ford explains. “You have to look at a lot of malware and, depending on where you go, it can start to feel as though you work on a production line. Grinding through a huge bucket of malware on a conveyor belt can be not very exciting.”

But for the inquisitive, malware analysts can map out very successful career paths within their company, and across the cybersecurity industry. Dr. Ford’s path has included malware analysis for a host of companies, university teaching and chief technology officer.

What should you learn next?

What should you learn next?

From SOC Analyst to Secure Coder to Security Manager — our team of experts has 12 free training plans to help you hit your goals. Get your free copy now.

“There is significant cooperation in cybersecurity and, as you’re trading malware samples, you’re also building lifelong professional relationships,” Ford says.  

As a kid who quickly became more interested in how computers worked over the games he was playing on them, Ford encourages aspiring malware analysts to be curious. He also suggests you be friendly because “climbing up the ladder does not mean pushing others down. Help people and they will help you back.”

To learn more about what it’s like to work as a malware analyst, watch our Cyber Work Podcast on malware analyst careers with Dr. Richard Ford of Cyren. 

Sources

Kimberly Doyle
Kimberly Doyle

Kimberly Doyle is principal at Kimberly Communications. An award-winning corporate communicator and content strategist, she has focused on enterprise technology for more than a decade. Her consultancy has led her to support in-house corporate communications teams for numerous technology goals including cybersecurity, SaaS and cloud management, data exchange, enterprise pricing and business analytics.