Anuj Soni

Co-Founder

Washington, DC, United States19 yrs 10 mos experience

Key Highlights

  • Expert in malware reverse engineering and analysis.
  • Instructor and course author at SANS Institute.
  • Founder of The Malware Lab for hands-on training.
Stackforce AI infers this person is a Cybersecurity Expert specializing in Malware Analysis and Threat Intelligence.

Contact

Skills

Core Skills

Malware AnalysisTrainingCourse DevelopmentThreat IntelligenceThreat Research

Other Skills

Reverse EngineeringPythonResearchPenetration TestingComputer ForensicsIntrusion DetectionVulnerability AssessmentComputer Security

About

Malware Reverse Engineer and SANS Institute Instructor/Author with a passion for double-clicking malware.

Experience

19 yrs 10 mos
Total Experience
3 yrs 3 mos
Average Tenure
1 mo
Current Experience

Reversinglabs

Advanced Technical Services

Mar 2026Present · 1 mo · Remote

Breakpoint cybersecurity

Founder & Instructor – The Malware Lab

Oct 2025Present · 6 mos

  • Creator of The Malware Lab, which delivers live, hands-on malware reverse engineering training that combines structured practice, accountability, and personalized feedback to help analysts strengthen their skills and tackle real-world threats.
  • Create and share informative YouTube videos on malware analysis topics (youtube.com/@sonianuj).
Malware AnalysisTraining

The johns hopkins university applied physics laboratory

Senior Reverse Engineer, Asymmetric Operations Sector (AOS)

Mar 2025Mar 2026 · 1 yr

Unitedhealth group

Principal Cybersecurity Analyst, Cyber Threat Intelligence (CTI)

Sep 2024Feb 2025 · 5 mos · Remote

  • Conducted reverse engineering to inform threat actor profiles, translating low-level malware behavior into actionable threat intelligence.
  • Served as a senior technical resource across CTI, DFIR, and Hunt teams, helping position the RE Unit as the internal authority for malware analysis.
  • Designed analysis and reporting templates to establish a consistent technical workflow for documenting malware behavior and findings.
  • Performed in-depth reverse engineering of malware to determine origin, capabilities, and embedded infrastructure.
  • Developed automated Python configuration extractors to decode embedded malware configs and reliably extract IOCs from obfuscated samples.
Threat IntelligenceMalware Analysis

Blackberry

Principal Threat Researcher, Threat Research and Intelligence

Mar 2019Feb 2024 · 4 yrs 11 mos

  • Reverse engineered sophisticated malware using dynamic and static code analysis to deobfuscate content, identify evasion techniques, extract indicators of compromise, and document comprehensive functionality.
  • Conducted comparative analysis of malware samples to identify new variants and improve detection models.
  • Automated unpacking and deobfuscation in Python with dynamic binary instrumentation and emulation frameworks.
  • Developed and led internal technical training to improve the team’s reverse engineering skills.
  • Published malware research on the corporate blog (https://blogs.blackberry.com/en/author/anuj-soni).
  • Submitted and had abstracts accepted for presentation at security conferences, including BSides Chicago, BSides Philadelphia, and BSides Baltimore.
Malware AnalysisThreat Research

Cylance inc.

Senior Threat Researcher

Jul 2016Feb 2019 · 2 yrs 7 mos

  • Perform malware research and reverse engineering.

Sans institute

Senior Instructor and Course Author

Feb 2012Jul 2025 · 13 yrs 5 mos

  • Instructor and author of FOR710: Reverse-Engineering Malware: Advanced Code Analysis (https://sans.org/for710)
  • Instructor and co-author of FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques (https://sans.org/for610)
Malware AnalysisCourse Development

Booz allen hamilton

Senior Incident Responder

Jan 2006Jul 2016 · 10 yrs 6 mos

  • Detect and respond to sophisticated intrusions across the enterprise.
  • Conduct malware analysis and reverse engineering activities.
  • Perform forensics analysis and data extraction on various media.
  • Execute penetration testing and vulnerability assessments to evaluate weaknesses in network architectures, access control mechanisms, and web applications.
  • Develop recommendations to enhance security posture and improve business processes.

Cert coordination center

Computer Forensics Researcher

Aug 2005Dec 2005 · 4 mos

Education

Carnegie Mellon University

MS Information Systems Management — Information Security

Jan 2004Jan 2005

Carnegie Mellon University

BS Information Systems

Jan 2001Jan 2005

Stackforce found 100+ more professionals with Malware Analysis & Training

Explore similar profiles based on matching skills and experience