In his current job Frank Poz works on tier 3 analysis of malware and network C2 in support of a network security operations center. There he has worked extensively with tools like IDA, OllyDbg, Wireshark, and a number of custom analysis tools.
Introduction to Software Reverse Engineering
Reverse Engineering Malware