Malware Analyst

NCC Group
Manchester
1 week ago
Create job alert

Join to apply for the Malware Analyst role at NCC Group.


We are on a mission to make society a safer and more secure place. Our people are the ones who make that possible; a global community of talented individuals working together towards a safer future.


We aim to create an environment where everyone can reach their full potential. We work together, we are brilliantly creative, we embrace difference and we want you to join in our mission, to make the world safer and more secure.


Take a look at our website here to learn more about why we’re one of the leading global Cyber Security and Risk Mitigation businesses: https://www.nccgroup.com/uk/


The Opportunity

As a Malware Analyst you will lead efforts in detecting, analyzing, and mitigating malware threats to safeguard organisational systems and data. By conducting advanced static and dynamic malware analysis, the role provides critical insights into emerging threats, supports incident response activities, and enhances detection capabilities through tool and signature development.


Together with colleagues spanning almost all time zones, you will help to make our clients safer and more secure against cyber threats by helping them understand the motivations of relevant actors, identifying their targets and how they operate.


The Global Threat Intelligence Team has built a very strong reputation when it comes to collecting our own data and combining this with open and commercial sources.


This role involves analysis of cyber threats, the development of actionable intelligence, and collaboration with various teams.


Your support to the wider organisation will be critical in the development of NCC Group’s Threat Intelligence capabilities and the broader service we offer.


Key Accountabilities

  • Conduct in-depth static and dynamic analysis of new and emerging malware threats, identifying potential risks and novel attack vectors.
  • Provide detailed analysis of malware samples as part of Digital Forensics and Incident Response (DFIR) investigations.
  • Respond to Requests for Information (RFIs) related to malware and binary analysis from internal and external teams.
  • Stay up-to-date with ongoing malware campaigns and techniques, providing insight into emerging or high-impact threats.

Documentation and Reporting

  • Document and report on the behaviour, techniques, tactics, and procedures (TTPs) used by malware.
  • Generate and share IOCs from malware analyses, leveraging the internal TIP tooling.
  • Contribute to external communications through blog posts that highlight unique or significant malware findings.

Tool and Signature Development

  • Develop and maintain tools and scripts for malware analysis, including custom configuration extractors and unpackers in the malware lab.
  • Based on malware analysis, create and refine detection signatures such as YARA rules. Identify network and host-based detection opportunities.

Collaboration and Information Sharing

  • Support the other pillars within the GTI team with research and analysis.
  • Work closely with DFIR teams to provide context and insights on malware threats.
  • Collaborate with the internal detection engineering team to ensure detections are in place for the latest threats.
  • Collaborate with external partners, information-sharing communities, and industry forums to stay updated on new malware threats and to share intelligence.

Technical Skills

  • Proven experience as a Malware Analyst, Threat Intelligence Analyst, or similar role with a focus on malware research and response.
  • Strong knowledge of reverse engineering tools and techniques for malware analysis, including tools like IDA Pro, Ghidra, OllyDbg, or similar.
  • Familiarity with programming languages such as Python, C++, or assembly for developing analysis tools and scripts.
  • Expertise in creating and maintaining YARA rules.
  • Strong understanding of networking protocols, including TCP/IP, DNS, and how malware utilises these protocols.

Ways of Working

Focusing on Clients and Customers.


Working as One NCC.


Being Inclusive and Respectful.


Delivering Brilliantly.


Our company

At NCC Group, our mission is to create a more secure digital future. That mission underpins everything we do, from our work with our incredible clients to groundbreaking research shaping our industry. Our teams partner with clients across a multitude of industries, delving into securing new products and emerging technologies, as well as solving complex security problems. As global leaders in cyber and escrow, NCC Group is a people‑powered business seeking the next group of brilliant minds to join our ranks.


Our colleagues are our greatest assets, and NCC Group is committed to providing an inclusive and supportive work environment that fosters creativity, collaboration, authenticity, and accountability. We want colleagues to put down roots at NCC Group, and we offer a comprehensive benefits package, as well as opportunities for learning and development and career growth. We believe our people are at their brilliant best when they feel bolstered in all aspects of their well‑being, and we offer wellness programmes and flexible working arrangements to provide that vital support.


What do we offer in return?

We have a high-performance culture which is balanced evenly with world-class well‑being initiatives and benefits:



  • Pension
  • Life Assurance
  • Share Save Scheme
  • Maternity & Paternity leave
  • Community & Volunteering Programmes
  • Learning & Development

So, what’s next?

We would love to hear from you! Click on apply to this job to send us your CV and cover letter and the relevant member of our global talent team will be in touch with you. Alternatively send your details to .


About your application

We review every application received and will get in touch if your skills and experience match what we’re looking for. If you don’t hear back from us within 10 days, please don’t be too disappointed – we may keep your CV on our database for any future vacancies and we would encourage you to keep an eye on our career opportunities as there may be other suitable roles.


If you do not want us to retain your details, please email . All personal data is held in accordance with the NCC Group Privacy Policy (candidate-privacy-notice-261023.pdf (nccgroupplc.com)). We are committed to diversity and flexibility in the workplace. If you require any reasonable adjustments to support you during the application process, please tell us at any stage.


Please note that this role involves mandatory pre‑employment background checks due to the nature of the work NCC Group does. To apply, you must be willing and able to undergo the vetting process. This role being advertised will be subject to BS7858 screening as a mandatory requirement.


#J-18808-Ljbffr

Related Jobs

View all jobs

Malware Analyst

Malware Analyst

Cyber Security Analyst

SOC Analyst

Vulnerability Analyst

Cyber Security Analyst

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.

How to Write a Cyber Security Job Ad That Attracts the Right People

Cyber security is now a board-level priority for organisations across the UK. From financial services and healthcare to critical infrastructure, SaaS platforms and the public sector, demand for skilled cyber security professionals continues to grow. Yet despite this demand, many employers struggle to attract the right candidates. Cyber security job adverts often generate large volumes of applications, but few are a genuine match. Meanwhile, experienced security engineers, analysts and architects quietly ignore adverts that feel vague, unrealistic or disconnected from real security work. In most cases, the problem is not a lack of talent — it is the quality of the job advert. Cyber security professionals are trained to assess risk, spot weaknesses and question assumptions. A poorly written job ad signals organisational immaturity and weak security culture. A well-written one signals seriousness, competence and trust. This guide explains how to write a cyber security job ad that attracts the right people, improves applicant quality and positions your organisation as a credible security employer.

Maths for Cyber Security Jobs: The Only Topics You Actually Need (& How to Learn Them)

If you are applying for cyber security jobs in the UK it can feel like “real security people” must be brilliant at maths. The reality is simpler: most roles do not need degree-level pure maths. What they do need is confidence with a small set of practical topics that show up repeatedly in day-to-day work across SOC, incident response, cloud security, AppSec, threat detection, IAM & security engineering. This guide strips the maths down to what actually helps you get hired. It includes a 6-week learning plan plus portfolio projects you can publish to prove the skills. You will focus on: Number systems & bitwise thinking (binary, hex, bytes, XOR) Modular arithmetic basics (enough to understand how modern crypto “works”) Probability & statistics for detection, triage & risk Discrete maths for logic, sets, graphs & complexity Security maths habits: estimation, false positive control & evidence-led reporting You will not waste time on heavy theory that rarely appears in junior or mid-level cyber security roles.