What are the responsibilities and job description for the Android Reverse Engineer position at Soft-World?
Job Title : Android Reverse Engineer
Job Location : Austin TX, San Fran CA, Seattle WA (100% On-Site)
Onsite Requirements :
Android
Reverse Engineering
Cybersecurity / Malwa
Job Description :
We are seeking a talented Reverse Android Engineer to join our team. The ideal candidate will have hands-on experience in reverse engineering Android applications, uncovering security vulnerabilities, and crafting solutions to improve software integrity. This role requires a blend of analytical skills, practical programming knowledge, and a deep understanding of the Android ecosystem.
Responsibilities :
Conduct reverse engineering of Android applications to identify security vulnerabilities.
Utilize static and dynamic analysis techniques, including decompilation, disassembly, debugging, and monitoring.
Analyze and audit application code to identify potential security flaws or issues.
Develop comprehensive technical documentation, reports, and presentations based on findings.
Collaborate with the team to design and implement remediation strategies for identified vulnerabilities.
Employ tools such as JADX, IDA Pro, Ghidra, Smali / Baksmali, ADB, and Frida for advanced analysis and debugging.
Monitor system calls, network traffic, and other program-environment interactions to detect anomalies.
Support incident response efforts by analyzing malware and other suspicious binaries.
Participate in Capture the Flag (CTF) and other challenges to enhance team skills and knowledge.
Provide expertise on cryptography, networking protocols, and Android system architecture.
Qualifications
Education
Master's degree in computer science, Cybersecurity, or a related field (preferred).
Bachelor's degree with equivalent practical experience will be considered.
Experience
Junior-Level : 1-3 years of relevant experience.
Mid-Level : 3-5 years of relevant experience.
Senior-Level : 5 years of relevant experience.
Technical Skills
Programming Languages : Proficient in Java / Kotlin, Python, and JavaScript. Experience with non-Java coding languages is a plus.
Android Fundamentals : Expertise in permissions, manifests, services, exported activities, and Dalvik / ART VM.
Reverse Engineering Tools : Proficiency with decompilers (JADX, Ghidra), disassemblers (Smali), debugging tools (ADB, JDWP), and HTTP interception tools (Burp Suite, HTTP Toolkit).
Cryptography and Encoding : Knowledge of Base64 encoding, encryption / decryption methodologies, and Cyber Chef.
Networking : Understanding of protocols like HTTP and TCP / IP.
Problem-Solving : Strong analytical and debugging skills.
Preferred Experience
Web application penetration testing.
Mobile forensics and binary / malware analysis.
Participation in CTF challenges or security-focused hackathons.
Incident response or experience with security operations.
- 3rd party and subcontract staffing agencies are not eligible for partnership in this position. 3rd party subcontractors need not apply.
This position requires candidates to be eligible to work in the United States, directly for an employer, without sponsorship now or anytime in the future.