What are the responsibilities and job description for the Android Reverse Software Engineer position at Excel Talent Solutions?
12th February, 2025
Android Malware Reverse Engineer
Full-time contract role - scheduled for a one year assignment with the possibility of being extended. In addition, could also be converted to FTE status should both parties be interested.
Location : living near one of these areas and be in the office 3 days a week.
Austin, TX
San Jose, CA
Bothell, WA
Description :
The Android Malware Reverse Engineers will conduct reverse engineering, security assessments, and code reviews. You will conduct and assist with complex decompilation, unpacking, code review and malicious mobile software reviews. The goal of the work is to identify families of malware and act on apps at scale. You will be responsible for developing static and dynamic signatures for mobile code, binaries, and executable code leading to the detection of a variety of threat types including malware, potentially unwanted programs (PUPs) and advanced persistent threats. Additionally, you will identify weaknesses in detections and automations and make recommendations for improvements in the detection process and automation pipeline. You are required to write complex reports for consumption of non-technical audiences, review peer reports and assist with investigations.
Requirements :
Hands on Experience with the following :
Analyzing, unpacking, and reverse engineering code of malicious applications or SDKs.
Static and Dynamic Analysis Techniques
Reverse Engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis
Java, Kotlin, JavaScript, Flutter, and other mobile software languages
ELF (Native Binaries) reverse engineering
Query languages such as SQL
Understanding of the following topics
Android Fundamentals such as Android activity lifecycles, common Android API usage, AOSP, and how an android application is created.
Java and / or Kotlin Programing Language
Techniques utilized by malicious software to harm the user's device or their data
Mobile App store policies (Ads, PHAs, Developer, etc.)
Ability to read, comprehend and analyze source code
Additional :
Development of signatures (Yara, etc.)
Research on threats such as APT using Open-Source Intelligence (Virus Total, Web, ExploitDB, MITRE, etc.)
In depth knowledge of security engineering and analysis topics, computer and network security, cryptography, authentication security, rooting, packing, network protocols and interception
Nice to Have :
Experience with Vulnerability Analysis or security code review
Android Software Development Experience
Background / Familiarity with Google Ads or Content moderation
Participation in a Capture the Flag (CTF) for Mobile software
Pen testing, Blue Team, and / or Red Team experience
Professional Experience and Education
Required / Preferred :
Associates / Bachelor's Degree / master's in computer science, computer engineering, CS, or information systems, or related discipline.
3-5 years of hands on Android and reverse engineering
If strong reverse engineering experience, can be trained on Android platform
Keep a pulse on the job market with advanced job matching technology.
If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution.
Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right.
Surveys & Data Sets
What is the career path for a Android Reverse Software Engineer?
Sign up to receive alerts about other jobs on the Android Reverse Software Engineer career path by checking the boxes next to the positions that interest you.