Job Description :

Position: ANDROID REVERSE ENGINEERS

Duration: 12+ months | Extension

Experience: 3+ years applicable experience required

Visa: All except H1B|| W2/C2C

Location: 100% Remote

Interview: Virtual Round

Client: Trellix

 

Interview Process: (IMPORTANT):

  • All done virtually
  • 1st step after recruiter screen is completing what's called a Capture-The-Flag (CTF) assessment.
  • Once completed - we submit the results of the CTF and resume to the hiring manager.
  • 2nd step would be a live technical assessment with the client - which would involve coding, static analysis, etc. There is a instructional video they watch before.
  • 3rd/final step = interview with hiring team

 

Job Description:

Experience & Tech that will be key:

  • Some Android experience - even if its just development / school/personal work
  • Any experience with reverse engineering code
  • Some exposure to coding with things like Java, Kotlin, JavaScript, Flutter, etc
  • Reverse engineering tools: Jadx, Ghidra, Frida, IDA Pro, Burp
  • Capture the Flag experience
  • Penetration testing

 

Android Reverse Engineer Junior Level (1+ years)

Are you fascinated by what happens after an app is compiled? Our team is seeking a driven Junior Android Reverse Engineer to turn that curiosity into a career. We provide a unique experience where you will be immersed in the complex world of mobile threat analysis from day one. You will be mentored by industry experts and get hands-on exposure to internal, state-of-the-art static and dynamic analysis tools. Your focus will be on delivering high-quality, high-speed analysis, deconstructing sophisticated Android applications to understand their core functionality and unmask potential threats. If you're ready to accelerate your skills, this is the place to do it.

 

Responsibilities:

Deep Dive Analysis: Conduct analysis of Android applications with speed and accuracy to understand their codebase, architecture, and functionality.

Reverse Engineering Techniques: Employ reverse engineering techniques to extract information from the android applications

Risk Identification: Identify user and device risk, data leakage, and malicious code execution within Android apps.

Security Assessment: Conduct security assessments of Android applications to identify potential risks.

Threat Intelligence: Review apps and provide the latest malware trends

Collaboration: Collaborate with security researchers, developers, and other stakeholders to share findings, provide recommendations, and contribute to the development of secure software.

Continuous Learning: Stay updated on the latest Android security threats, vulnerabilities, and reverse engineering techniques.

 

Requirements:

  • Hands on Experience with the following:
  • Analyzing or reverse engineering code, preferably of malicious applications
  • Ability to read, comprehend and analyze source code
  • Experience with Java or Kotlin
  • Exposure to JavaScript, Flutter, and/or other mobile software languages
  • Query languages such as SQL

 

Preferred:

  • Reverse Engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform
  • binary and APK analysis
  • ELF (Native Binaries) reverse engineering
  • Understanding of the following topics
  • Android Fundamentals such as Android activity lifecycles, common Android API usage,
  • AOSP, and how an android application is created.
  • Java and/or Kotlin Programing Language
  • Fundamentals of Network traffic security
  • Additional:
  • Development of signatures (Yara, etc.)
  • Research on threats such as APT using Open-Source Intelligence (Virus Total, Web,
  • ExploitDB, MITRE, etc.)
  • In depth knowledge of security engineering and analysis topics, computer and network
  • security, cryptography, authentication security, rooting, packing, network protocols and
  • interception

 

Nice to Have:

  • Android Software Development Experience or Reverse Engineering experience
  • Background / Familiarity with Google Ads or Content moderation
  • Participation in a Capture the Flag (CTF) for Mobile software
  • Pentesting, Blue Team, and/or Red Team experience
  • Professional Experience and Education

 

Required:

  • 1 - 3 years experience in one or more of the following: Android Development, Reverse
  • Engineering, Pentesting, Application Security Assessments
  • Preferred:
  • Associates/Bachelor's Degree/master s in computer science, computer engineering, CS,
  • or information systems, or related discipline.
  • 1 - 3 years of hands on Android App Development /Reverse Engineering
             

Similar Jobs you may be interested in ..