› Certifications · compare
Compare certifications
Pick up to 3 certifications and compare them side-by-side on cost, exam format, recertification, salary signal, quality, and domain coverage.
GIAC / SANS · expert
GREMGIAC Reverse Engineering Malware
Static + dynamic malware analysis, unpacking, custom RE tooling.
Official pageComparing
GIAC / SANSGREM
› Cost
Exam fee
GREM$979
Exam fee
$979
Annual maintenance fee
GREM—
Annual maintenance fee
—
3-year cost of ownership
GREM$979
3-year cost of ownership
$979
› Exam mechanics
Pass mark
GREM73% (scaled per attempt)
Pass mark
73% (scaled per attempt)
Retake policy
GREM$999 fee · 30d wait
Retake policy
$999 fee · 30d wait
Study time
GREM200–400 hrs
Study time
200–400 hrs
Validity
GREM4 yrs
Validity
4 yrs
CPE / yr
GREM9 CPEs
CPE / yr
9 CPEs
Delivery
GREMonline proctored
Delivery
online proctored
› Salary signal (US base)
Range
GREM$120K – $180K
Range
$120K – $180K
Median
GREM$145,000
Median
$145,000
Premium %
GREM—
Premium %
—
Role context
GREMMalware analyst / threat-research engineer, US, 4-7 years.
Role context
Malware analyst / threat-research engineer, US, 4-7 years.
› Quality (4-axis rubric · 0–10)
Schema quality
GREM9.0
Schema quality
9.0
Practice evidence
GREM7.0
Practice evidence
7.0
Maintenance
GREM7.5
Maintenance
7.5
Market recognition
GREM7.5
Market recognition
7.5
Average
GREM7.8
Average
7.8
› Recognition & lifecycle
Recognition
GREMGlobal · US · EU · UK
Recognition
Global · US · EU · UK
ISO 17024 accredited
GREM✓
ISO 17024 accredited
✓
DoD 8140 baseline
GREM—
DoD 8140 baseline
—
Holders worldwide
GREM5,000
Holders worldwide
5,000
Current version
GREM2024 FOR610 refresh (2024-06)
Current version
2024 FOR610 refresh (2024-06)
› Domain coverage
A11Detection Engineering & Threat Hunting
GREM● core
A11Detection Engineering & Threat Hunting
● core
A21Malware Analysis & Reverse Engineering
GREM● core
A21Malware Analysis & Reverse Engineering
● core
A7Incident Response & Forensics
GREM● core
A7Incident Response & Forensics
● core
A8Threat Intelligence
GREM○ touched
A8Threat Intelligence
○ touched
Browse the full catalog or open any one of these on its detail page for full study materials, peer comparisons, and lifecycle notes.