Android Reverse Engineer ||willing to go onsite in Austin, TX or Bothell, WA or the Bay Area, CA at Austin, Texas, USA |
Email: [email protected] |
From: Garima, Tek Inspirations LLC [email protected] Reply to: [email protected] Note- This role is very active now and client is eager to hire. 100% interview!! Android Reverse Engineer Location- willing to go onsite in Austin, TX or Bothell, WA or the Bay Area, CA 12+ months Any visa Must have Android Reverse Engineering exp. Summary: Looking for Low, Mid, Snr Level (3+ years) The Android Malware Reverse Engineers will conduct reverse engineering, security assessments, and code reviews. Professional Experience and Education Associates/Bachelors Degree/masters in computer science, computer engineering, CS, or information systems, or related discipline. 3-5 years of hands on Android and reverse engineering In depth understanding and experience in Android internal Responsibilities: You will conduct and assist with complex decompilation, unpacking, code review and malicious mobile software reviews. The goal of the work is to identify families of malware and act on apps at scale. You will be responsible for developing static and dynamic signatures for mobile code, binaries, and executable code leading to the detection of a variety of threat types including malware, potentially unwanted programs (PUPs) and advanced persistent threats. Additionally, you will identify weaknesses in detections and automations and make recommendations for improvements in the detection process and automation pipeline. You are required to write complex reports for consumption of non-technical audiences, review peer reports and assist with investigations. Requirements: - Hands on Experience with the following: Review malicious applications and SDKs by analyzing, unpacking and reverse engineering software that compromises Android devices. Static and Dynamic Analysis Experience with Reverse Engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis Code reviews for security policy violations, vulnerabilities, or improper coding practices Experience with Java, Kotlin, JavaScript, Flutter, and other mobile software languages o Experience with ELF (Native Binaries) reverse engineering - Understanding of the following topics In depth understanding of Android Internals Java Programing Language o Techniques utilized by malicious software to tamper with user devices and make removal more difficult. o Android Security Topics Mobile App store policies (Ads, PHAs, Developer, etc.) Ability to read, comprehend and analyze source code software o - Additional: o Development of signatures (Yara, etc.) Research on threats such as APT using Open-Source Intelligence (Virus Total, Web, ExploitDB, MITRE, etc.) In depth knowledge of security engineering and analysis topics, computer and network security, cryptography, authentication security, rooting, packing, network protocols and interception Background / Familiarity with Google Ads or Content moderation is an added bonus Nice to Have: Experience with Vulnerability Analysis Android Development Capture the Flag in Mobile Software Keywords: golang California Texas Washington Android Reverse Engineer ||willing to go onsite in Austin, TX or Bothell, WA or the Bay Area, CA [email protected] |
[email protected] View all |
Fri Apr 19 01:21:00 UTC 2024 |