Home

Android Reverse Engineer ||willing to go onsite in Austin, TX or Bothell, WA or the Bay Area, CA at Austin, Texas, USA
Email: [email protected]
From:

Garima,

Tek Inspirations LLC

[email protected]

Reply to:   [email protected]

Note- This role is very active now and client is eager to hire. 100% interview!!

Android Reverse Engineer 

Location- 
willing to go onsite in Austin, TX or Bothell, WA or the Bay Area, CA

12+ months

Any visa 

Must have Android Reverse Engineering exp.

Summary: Looking for Low, Mid, Snr Level (3+ years) The Android Malware Reverse Engineers will conduct reverse engineering, security assessments, and code reviews. 

Professional Experience and Education 
Associates/Bachelors Degree/masters in computer science, computer engineering, CS, or information systems, or related discipline. 
3-5 years of hands on Android and reverse engineering 
In depth understanding and experience in Android internal

Responsibilities:
You will conduct and assist with complex decompilation, unpacking, code review and malicious mobile software reviews. 
The goal of the work is to identify families of malware and act on apps at scale. 
You will be responsible for developing static and dynamic signatures for mobile code, binaries, and executable code leading to the detection of a variety of threat types including malware, potentially unwanted programs (PUPs) and advanced persistent threats. 
Additionally, you will identify weaknesses in detections and automations and make recommendations for improvements in the detection process and automation pipeline. 
You are required to write complex reports for consumption of non-technical audiences, review peer reports and assist with investigations. 

Requirements: - 

Hands on Experience with the following: 
Review malicious applications and SDKs by analyzing, unpacking and reverse engineering software that compromises Android devices. 
Static and Dynamic Analysis 
Experience with Reverse Engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis 
Code reviews for security policy violations, vulnerabilities, or improper coding practices 
Experience with Java, Kotlin, JavaScript, Flutter, and other mobile software languages o Experience with ELF (Native Binaries) reverse engineering - Understanding of the following topics 
In depth understanding of Android Internals 
Java Programing Language o Techniques utilized by malicious software to tamper with user devices and make removal more difficult. o Android Security Topics 
Mobile App store policies (Ads, PHAs, Developer, etc.) 
Ability to read, comprehend and analyze source code software o - Additional: o Development of signatures (Yara, etc.) 
Research on threats such as APT using Open-Source Intelligence (Virus Total, Web, ExploitDB, MITRE, etc.)
In depth knowledge of security engineering and analysis topics, computer and network security, cryptography, authentication security, rooting, packing, network protocols and interception 
Background / Familiarity with Google Ads or Content moderation is an added bonus 

Nice to Have: 
Experience with Vulnerability Analysis Android Development Capture the Flag in Mobile Software

Keywords: golang California Texas Washington
Android Reverse Engineer ||willing to go onsite in Austin, TX or Bothell, WA or the Bay Area, CA
[email protected]
[email protected]
View all
Fri Apr 19 01:21:00 UTC 2024

To remove this job post send "job_kill 1323884" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 91

Location: , Indiana