Awesome Malware & Reverse Engineering Certification 
- GIAC Reverse Engineering Malware Certification (GREM)
- Malware Research Company
- My Other Awesome Lists
- Contributing
- Contributors
- Analyzing Malicious Office Macros: The candidate will be able to analyze macros and scripts embedded in suspicious Microsoft Office files to understand their capabilities.
- Analyzing Malicious PDFs: The candidate will be able to analyze suspicious PDFs and embedded scripts to understand the nature of the threat they might pose.
- Analyzing Malicious RTF Files: The candidate will be able to analyze suspicious RTF files and embedded shellcode to understand their capabilities.
- Analyzing Obfuscated Malware: The candidate will be able to identify packed Windows executables and obfuscated malicious JavaScript and unpack it to gain visibility of it's key capabilities.
- Behavioral Analysis Fundamentals: The candidate will be able analyze static properties of a suspected malware sample, develop theories regarding its nature, and determine subsequent analysis steps.
- Common Malware Patterns: The candidate will be able to identify common API calls used by malware and understand what capabilities the APIs offer to the malware samples. The candidate will be able to identify common techniques used by malware including code injection, hooking, and process hollowing techniques.
- Core Reverse Engineering Concepts: The candidate will apply dynamic analysis techniques to examine a malware sample in a debugger and will apply static analysis techniques to interpret common assembly instructions and patterns in Windows malware using a disassembler.
- Examining .NET Malware: The candidate will be able to analyze .NET programs to understand their capabilities.
- Identifying and Bypassing Anti-Analysis Techniques: The candidate will be able to identify and bypass common debugger detection and data protection measures used in malware, including the detection of security tools.
- Malware Analysis Fundamentals: The candidate will be able to describe key methods for analyzing malicious software and identify the needs of malware analysis lab.
- Malware Flow Control and Structures: The candidate will be able to analyze common execution flow control mechanisms, such as loops and conditional statements, in assembly language.
- Overcoming Misdirection Techniques: The candidate will be able to overcome misdirecting execution workflow as an anti-analysis technique used in malware.
- Reversing Functions in Assembly: The candidate will be able to analyze malware functions in assembly language to understand use of parameters, return values and other structural elements.
- Static Analysis Fundamentals: The candidate will be able analyze static properties of a suspected malware sample, develop theories regarding its nature, and determine subsequent analysis steps.
- Unpacking and Debugging Packed Malware: The candidate will demonstrate process for unpacking malware using a debugger and repairing unpacked malware for further analysis.
- Acronis - Jobs
- Akamai - Jobs
- Anomali - Jobs
- BAE Systems - Jobs
- Check Point Software - Jobs
- Cisco - Jobs
- CrowdStrike - Jobs
- Comodo - Jobs
- Cybereason - Jobs
- Eset - Jobs
- GenDigital - Jobs
- IBM - Jobs
- Juniper Networks - Jobs
- Malwarebytes - Jobs
- McAfee - Jobs
- Netskope - Jobs
- Nozomi Networks - Jobs
- F-Secure - Jobs
- Forcepoint - Jobs
- Fortinet - Jobs
- Halcyon - Jobs
- HP Wolf Security - Jobs
- Palo Alto Networks - Jobs
- ReversingLabs - Jobs
- SentinelOne - Jobs
- Sophos - Jobs
- Tenable - Jobs
- Thales - Jobs
- Trellix - Jobs
- Varonis - Jobs
- WatchGuard - Jobs
- Zscaler - Jobs
You can access the my other awesome lists here
Contributions of any kind welcome, just follow the guidelines!