Please scroll down, To apply

Junior Android Malware Reverse Engineer

hiring now
New job

Nearshore Cyber

2024-11-08 00:42:07

Job location San Francisco, California, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description



Job Description:

Junior Android Malware Reverse Engineer
Location: Onsite - San Francisco Bay Area, Austin TX or Bothel, WA.
Principals only. No recruiters or firms.

Hours: Full-time

We are seeking a motivated and detail-oriented Junior Android Malware Reverse Engineer to join our team. Recent graduates with relevant skills and a passion for mobile security are encouraged to apply. This role involves conducting reverse engineering, security assessments, and code reviews for malicious Android applications.

Responsibilities:

Conduct static and dynamic analysis of Android malware.

Assist in reverse engineering, decompilation, and unpacking of mobile software.

Develop signatures (Yara, etc.) for malware detection.

Support the identification of Android malware families and assist with app analysis at scale.

Collaborate on security assessments and code reviews for potential vulnerabilities.

Requirements:

Hands-on experience or strong foundational knowledge of reverse engineering.

Familiarity with tools such as Jadx, Ghidra, Frida, and IDA Pro.

Understanding of Java, Kotlin, JavaScript, and other mobile programming languages.

Basic knowledge of Android internals and mobile app store policies.

Ability to analyze and interpret source code for security purposes.

Preferred:

Bachelors degree in Computer Science, Engineering, or a related field.

Participation in Capture the Flag (CTF) competitions or mobile security challenges.

Inform a friend!

<!– job description page –>
Top