Research Intern - RedTeam Location: Remote Type: Internship – Research-Oriented Duration: 3 months Timing: Flexible Stipend: Performance-based (Certificates, LORs, PPO for top performers) Start Date: Immediate About Malforge Academy Malforge Academy is a next-generation offensive cybersecurity platform focused on ethical malware development , red teaming , and adversary simulation . We train and mentor the next wave of ethical hackers through hands-on learning, deep research, and practical labs that go far beyond theory. We build and teach what real-world red teamers use: custom payloads, evasion techniques, and in-memory tooling — all designed for stealth, performance, and realism. Job Description We are looking for a motivated Malware Development Research Intern to join our cybersecurity research team. This role will focus on analyzing and understanding malware behavior, reverse-engineering malicious code, and contributing to the development of tools to detect and mitigate threats. The intern will work closely with our security research initiatives. We build and teach what real-world red teamers use: custom payloads, evasion techniques, and in-memory tooling — all designed for stealth, performance, and realism. Responsibilities Conduct in-depth analysis of malware samples to understand their functionality, propagation methods, and impact. Reverse-engineer malicious code using tools like IDA Pro, Ghidra etc. Assist in developing and testing proof-of-concept tools for malware detection and analysis. Collaborate with the team to integrate AI-driven approaches into malware research workflows. Document findings and present research results to the team. Interest in ethical malware development , reverse engineering , or red teaming Stay updated on the latest malware trends, vulnerabilities, and threat intelligence. Implement code injection techniques like DLL injection, process hollowing, thread hijacking, etc. Willingness to learn and experiment independently in a research-heavy role What You Will Work On This is a research-centric internship designed for individuals passionate about offensive security and malware development. As an intern, you will: Research and develop Proof-of-Concept (PoC) malware and red team implants Explore and implement AV/EDR evasion techniques (e.g., API unhooking, process injection, LOLBAS) Build custom loaders, droppers, remote access tools (RATs), and C2-compatible payloads Experiment with sandbox evasion, AMSI bypass, and in-memory execution methods Analyze and modify real-world malware samples for research and evasion testing Write and analyze malware in C/C++, Python, Go, Rust , or Assembly Work with different RedTeam tools What You'll Gain Mentorship from professional malware developers and red teamers Access to an isolated Malware R&D Lab (VMs, test samples, tools, guides) Real-world experience in offensive malware tooling Flexible work arrangements A collaborative and innovative work environment How to Apply Please send the following: Your Resume (PDF) GitHub, GitLab, or any code/project portfolio (if available) A short write-up of any malware-related research, experiments, or personal projects (even blogs or labs) 📧 Email to: malforgeacademy@gmail.com Subject Line: Internship Application – Malware R&D If you’re serious about leveling up in offensive security and want to be mentored by professionals in malware R&D — we invite you to apply and get hands-on with cutting-edge red team tooling. Note: This internship is strictly for legal, educational, and simulation purposes only. We do not support or condone black-hat activity.