- Home
- About CSA
- Careers
- Working in CSA
- #WorkinginCSA: Engineering Solutions in the Fight Against Cyber Threats
#WorkinginCSA: Engineering Solutions in the Fight Against Cyber Threats
14 February 2025
Ahmad Abdillah is a Systems Engineer in CSA’s National Cyber Incident Response Centre (NCIRC), and he is part of the Malware Analysis team, working as a technical lead for malware operations. Outside of work, he enjoys staying up-to-date on the lates

Tell us about your cybersecurity journey – what drew you to work in malware analysis, and eventually to join CSA?
My journey into cybersecurity began with a fascination for deconstructing software at its most granular level—a passion that naturally evolved into a specialisation in reverse engineering. I quickly became captivated by the process of reverse engineering; meticulously dissecting binaries to reveal hidden functionalities, bypass intricate obfuscation layers, and neutralise sophisticated anti-analysis measures.
By diving deep into an executable’s assembly code using tools like IDA Pro, WinDbg, and custom scripts, I can extract critical indicators and reconstruct attack methodologies. Every day is a technical challenge—from reverse engineering malware samples and debugging complex code to translating my findings into actionable threat intelligence that enhances incident response.
Joining CSA has provided an exceptional platform to collaborate with experts who share my passion for reverse engineering and fortifying our nation’s critical information infrastructure against ever-evolving cyber threats.
What inspired you to pursue a career in this field?
My interest was ignited by early encounters with software vulnerabilities, where I witnessed first-hand how subtle code manipulations could trigger unintended, disruptive behaviours.
Exposure to code vulnerabilities made me realise the real impact of even subtle flaws. It steered me toward malware analysis, where I learned that every malicious program holds layers of complexity that can only be unravelled through reverse engineering. This approach of carefully dissecting binary code to uncover hidden functionalities became essential in understanding and countering advanced cyber threats.
My drive to decode complex digital threats and develop robust defence strategies has since evolved into a dedicated career, with each challenge in malware analysis reinforcing my commitment to transforming early lessons in vulnerability into sophisticated techniques for safeguarding our digital ecosystem.
What has been your most memorable experience in CSA? Any interesting projects you were involved in?
One of my most rewarding experiences at CSA has been immersing myself in the dynamic and collaborative culture of NCIRC. Working in projects such as automating segments of our malware analysis workflow has been technically challenging and deeply satisfying. By refining our reverse engineering and automation techniques, we’ve significantly boosted our capacity to generate precise threat signatures and enhance incident response efforts.
Equally memorable is the team spirit at NCIRC; colleagues and supervisors alike are both knowledgeable and approachable, creating an environment where cross-disciplinary collaboration turns complex cases into a true team sport. This supportive community not only enriches my professional growth but also strengthens our collective mission to protect Singapore’s critical information infrastructure.
Any advice for those looking to break into the cybersecurity industry?
For anyone eager to enter cybersecurity, I recommend combining hands-on experimentation with a clear focus on real-world impact.
Start by setting up a safe, controlled environment such as a virtual machine sandbox to analyse programs using debuggers, disassemblers, and static analysis tools. The insights you gain goes beyond theory; it serves as the foundation for crafting actionable threat signatures and refining incident response measures.
By dissecting malware and understanding its behaviour, you develop the critical skills needed to detect anomalies, anticipate attack vectors, and implement robust defences. Embracing this investigative mindset will not only build your technical expertise but also prepare you to contribute meaningfully to the dynamic world of cybersecurity.
Outside of work, do you have any hobbies and interests?
Currently, my biggest hobby and interest is my 1-year-old son! While it's undoubtedly a full-time commitment, it's immensely rewarding. Becoming a new father has taught me valuable lessons in patience, adaptability, and problem-solving – skills that surprisingly carry over into my role as a malware analyst.
There are some intriguing parallels between decoding an infant's cries and dissecting malicious code. Both require patience, attention to detail, and critical thinking.
In the rare moments when I do have some free time, I find myself drawn to cybersecurity news and research. It's an unconventional way of unwinding, but it helps me relax while staying connected to my field. It keeps me sharp and informed, even outside of work hours.