ExpertVendor-neutralISO 17024GIAC / SANS· issued from US

GREM

GIAC Reverse Engineering Malware

Static + dynamic malware analysis, unpacking, custom RE tooling.

Exam fee
$979
Ongoing
$0/yr AMF · 9 CPE/yr
Study time
200–400 hrs
Delivery
Online proctored
Validity
4 yrs (renewal cycle)

› Quality score

31.0 / 40

Four-axis SecProve rubric, each 0–10. SecProve editorial assessment — each axis carries a written justification so you can push back on any single call without dismissing the whole score.

Blueprint rigor
How well-defined and rigorous the exam blueprint is.
FOR610 syllabus is comprehensive; explicit on static + dynamic + unpacking.
9.0/10
Practical evidence
Hands-on labs / written reports vs pure MCQ.
Cyber Live RE segment forces actual disassembly work. Strong practice signal for an MCQ-anchored exam.
7.0/10
Currency & upkeep
How aggressively content is kept current with the field.
FOR610 refreshes every ~2 years; current covers modern packers.
7.5/10
Market recognition
How often this signal actually moves a hiring decision.
The default reverse-engineering credential in IR and threat-research circles. [Holders: 5k, 2024-12]
7.5/10

› Market signals

public, citable inputs to the recognition score
Holders worldwide
5,000
as of 2024-12 · source

› Built for these roles

Malware AnalystReverse EngineerThreat ResearcherSenior DFIR Analyst

› Exam format

Open-book MCQ exam, 75 questions over 3 hours, online proctored. Heavy focus on disassembly snippets.

Passing score
73% (scaled per attempt)
Retake policy
Fee: $999 per attempt
Wait: 30d between attempts

30-day wait. SANS course bundles typically include 2 attempts.

› Recertification

36 CPE credits over four years (avg 9/yr) plus the $499 renewal fee per cycle.

› NICE Framework work roles

The NIST NICE work-role IDs this cert maps to. NICCS lookup.

PD-WRL-001IN-WRL-001IN-WRL-002PD-WRL-002PD-WRL-003
Recognition
GlobalUSEUUK
Exam languages
en

› Core domains covered

The 3 domains this cert is centrally about. Passing the exam demonstrates working knowledge of each.

› Also touched

Present in the blueprint but not the primary focus — you’ll be introduced but shouldn’t expect depth.

› Prerequisites

Experience

Three-plus years of security experience. Assembly fluency is a real prerequisite — not optional. Usually paired with SANS FOR610.

Knowledge assumed
  • x86/x64 assembly
  • Debuggers (x64dbg, WinDbg) and disassemblers (IDA, Ghidra)
  • Static and dynamic analysis workflows

› Progression

requiredrecommended

Where this cert fits in the typical learning path. Required edges are vendor-gated; recommended edges reflect de facto industry progression.

Required prereqs (0)

No vendor-gated prereqs.

Recommended priors (2)
GREM
GIAC / SANS
Required by (0)

No certs require this one.

Recommended next (1)

› Study materials

Curated starting points. Not exhaustive — vet each against your learning style and the current exam version.

Official guides
Practice tests
  • GIAC Practice Tests (2 included with exam)
Free / community
  • Practical Malware Analysis (Sikorski/Honig)
  • REMnux

› Version & lifecycle

Current version
2024 FOR610 refresh
Released
2024-06

› Salary signal

Malware analyst / threat-research engineer, US, 4-7 years.

$120K$180K
median $145K

Robert Half Salary Guide + Glassdoor 'Malware Analyst' aggregations · 2024 · US base only · p25–p75 range

› How it compares

vs
GCFA

GREM is malware reverse engineering; GCFA is forensic analysis. Often paired in DFIR teams.

↔ Compare side-by-side

› Careers that commonly pursue this cert

Malware Reverse Engineer

Dissect malicious software to understand capabilities, extract indicators, and produce attribution. A specialist role that powers threat intelligence, detection engineering, and advanced IR.

See this cert’s domains highlighted on the interactive map, or compare it against the rest of the catalog.