Reverse Engineer - Android CITIZEN,GREEN CARD ONLY On-site 2 days a week in Bothell, Austin, or San Jose Hybrid at Austin, Texas, USA |
Email: [email protected] |
Hello , Please have a look at the position below and let me know if you have a candidate CITIZEN,GREEN CARD ONLY Reverse Engineer - Android Location: Hybrid On-site 2 days a week in Bothell, Austin, or San Jose Hybrid trusted third parties - linkedin need We are seeking Android App Reverse Engineers with 3+ years of hands-on experience to conduct reverse engineering, security assessments, and code reviews. This role will involve analyzing, decompiling, and unpacking malicious mobile software to identify malware families and address threats at scale. You will play a key role in developing static and dynamic signatures for detecting malware, potentially unwanted programs (PUPs), and advanced persistent threats. Additionally, you will contribute to enhancing detection processes, reviewing peer reports, and assisting with complex investigations. Key Responsibilities Analyze malicious applications and SDKs through unpacking and reverse engineering software that compromises Android devices. Perform static and dynamic analysis using tools such as Jadx, Ghidra, Frida, IDA Pro, and Burp to analyze binaries and APKs. Conduct code reviews to identify security policy violations, vulnerabilities, and improper coding practices. Write detailed reports for non-technical audiences and support investigative efforts. Requirements Technical Expertise: Proficient in Java, Kotlin, JavaScript, Flutter, and mobile software languages. Experience with ELF (Native Binaries) reverse engineering. Deep understanding of Android Internals and Android Security Topics. Familiarity with techniques used by malicious software to tamper with user devices. Knowledge of Mobile App Store policies (Ads, PHAs, Developer requirements, etc.). Tools and Techniques: Proficient in reverse engineering tools (Jadx, Ghidra, Frida, IDA Pro, Burp). Capable of developing Yara signatures and leveraging open-source intelligence tools (VirusTotal, Web, ExploitDB, MITRE). In-depth knowledge of security engineering, cryptography, authentication security, rooting, packing, and network interception. Additional Experience (Preferred): Familiarity with vulnerability analysis and Android app development. Capture the Flag (CTF) experience in mobile software. Nice to Have Background or familiarity with Google Ads or content moderation. Professional Experience and Education Required: None explicitly required. Preferred: Associate s, Bachelor s, or Master s degree in Computer Science, Computer Engineering, or related discipline. 3 5 years of hands-on Android and reverse engineering experience, including expertise in Android internals. Regards, Aniket Kumar Mishra Senior Recruitment Executive | Specialized in Java & UI Talent Acquisition VYZE INC 25179 Methley Plum Place, Aldie, VA 20105 Email: [email protected] LinkedIn: linkedin.com/in/aniket-kumar-mishra-304029200 Hangout: [email protected] Disclaimer: This communication, along with any documents, files or attachments, is intended only for the use of the addressee and may contain confidential information. If you are not the intended recipient, you are hereby notified that any dissemination, distribution or copying of any information contained in or attached to this communication is strictly prohibited, To remove your email address permanently from future mailings, please send REMOVE to [email protected] . -- Keywords: user interface information technology Virginia Reverse Engineer - Android CITIZEN,GREEN CARD ONLY On-site 2 days a week in Bothell, Austin, or San Jose Hybrid [email protected] |
[email protected] View all |
Thu Dec 26 21:06:00 UTC 2024 |