Android Malware Reverse Engineer
- Category: Android Developer Jobs
- Location: Austin, Texas
- Job Type: Full Time / Part Time
- Salary: Estimated: $ 20K to 31K
- Published on: 2025/09/21
Job highlights
Identified by Google from the original job post
Qualifications
The ideal candidate will possess a robust skill set in Android development, security assessments, and malware analysis
This role requires hands-on experience with reverse engineering tools and techniques, a strong understanding of Android fundamentals, and proficiency in several programming languages
Hands-on experience with analyzing, unpacking, and reverse engineering malicious applications or SDKs
Proficient in static and dynamic analysis techniques
Familiarity with reverse engineering tools including Jadx, Ghidra, Frida, IDA Pro, and Burp Suite
Strong programming skills in Java, Kotlin, JavaScript, and familiarity with mobile software languages such as Flutter
Experience with ELF (Native Binaries) reverse engineering
Proficiency in SQL and experience with query languages
Understanding of Android fundamentals including activity lifecycles, common API usage, AOSP, and application development
Knowledge of malicious software techniques and mobile app store policies (Ads, PHAs, Developer, etc.)
Ability to read, comprehend, and analyze source code
Previous experience with web app penetration testing
Background in malware analysis on Windows platforms with willingness to learn Android-specific techniques
Bachelor’s degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience
Responsibilities
The successful candidate will be responsible for analyzing, decompiling, and evaluating malicious software to identify threats and develop detection signatures
Conduct reverse engineering, security assessments, and code reviews of malicious Android applications and SDKs
Utilize static and dynamic analysis techniques to analyze malware and identify threat patterns
Employ reverse engineering tools such as Jadx, Ghidra, Frida, IDA Pro, and Burp Suite for binary and APK analysis
Develop and implement static and dynamic signatures for mobile code, binaries, and executable files
Write complex SQL queries to analyze data and identify common issues across malware samples
Identify weaknesses in current detection methods and recommend improvements to enhance detection processes and automation pipelines
Prepare detailed reports on findings for both technical and non-technical audiences
Review peer reports and assist with investigations related to mobile malware threats
Job description
Job Title: Android Malware Reverse Engineer
Location: San Jose CA, Austin, TX , Bothell, WA
Rate : $50 to $55/-hr on c2c
Experience: 8+
lalit@vedicstaffing.com
Job Overview:-
We are seeking an experienced Android Malware Reverse Engineer to join our team . The ideal candidate will possess a robust skill set in Android development, security assessments, and malware analysis. This role requires hands-on experience with reverse engineering tools and techniques, a strong understanding of Android fundamentals, and proficiency in several programming languages. The successful candidate will be responsible for analyzing, decompiling, and evaluating malicious software to identify threats and develop detection signatures.
Key Responsibilities:-
Conduct reverse engineering, security assessments, and code reviews of malicious Android applications and SDKs.
Utilize static and dynamic analysis techniques to analyze malware and identify threat patterns.
Employ reverse engineering tools such as Jadx, Ghidra, Frida, IDA Pro, and Burp Suite for binary and APK analysis.
Develop and implement static and dynamic signatures for mobile code, binaries, and executable files.
Write complex SQL queries to analyze data and identify common issues across malware samples.
Identify weaknesses in current detection methods and recommend improvements to enhance detection processes and automation pipelines.
Prepare detailed reports on findings for both technical and non-technical audiences.
Review peer reports and assist with investigations related to mobile malware threats.
Required Skills and Experience:-
Hands-on experience with analyzing, unpacking, and reverse engineering malicious applications or SDKs.
Proficient in static and dynamic analysis techniques.
Familiarity with reverse engineering tools including Jadx, Ghidra, Frida, IDA Pro, and Burp Suite.
Strong programming skills in Java, Kotlin, JavaScript, and familiarity with mobile software languages such as Flutter.
Experience with ELF (Native Binaries) reverse engineering.
Proficiency in SQL and experience with query languages.
Understanding of Android fundamentals including activity lifecycles, common API usage, AOSP, and application development.
Knowledge of malicious software techniques and mobile app store policies (Ads, PHAs, Developer, etc.).
Ability to read, comprehend, and analyze source code.
Preferred Qualifications:-
Previous experience with web app penetration testing.
Background in malware analysis on Windows platforms with willingness to learn Android-specific techniques.
Educational Requirements:
Bachelor’s degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience.
Related jobs
-
Core Developer (Android)
About The Role This role, while primarily focused on Android development, will frequently involve working with Flutter and Dart for cross-platform solutions. Responsibilities Include And Are Not Limited To Reporting and taking instruction from the Pr...
-
Android/Ios developers
Android/Ios developers with 5yrs of experience
-
Senior Ios/Android Developer Lead
We're seeking a highly skilled and experienced Senior iOS/Android Developer Lead to spearhead our mobile development efforts. As a key member of our team, you will be responsible for leading the design, development, and deployment of our mobile appli...