Talent.com
Android Reverse Engineer

Android Reverse Engineer

Hudson ManpowerAustin, TX, US
job_description.job_card.30_days_ago
serp_jobs.job_preview.job_type
  • serp_jobs.job_card.full_time
job_description.job_card.job_description

For over half a decade, Hudson Manpower has been a trusted partner in delivering specialized talent and technology solutions across IT, Energy, and Engineering industries worldwide. We work closely with startups, mid-sized firms, and Fortune 500 clients to support their digital transformation journeys. Our teams are empowered to bring fresh ideas, shape innovative solutions, and drive meaningful impact for our clients. If you're looking to grow in an environment where your expertise is valued and your voice matters, then Hudson Manpower is the place for you. Join us and collaborate with forward thinking professionals who are passionate about building the future of work.

Overview

We are seeking a highly skilled Android Reverse Engineer with strong expertise in analyzing Android applications at a code level. This role is not for standard Android developers—we require someone experienced in reverse engineering Kotlin or Java code, ideally to identify malware or other security vulnerabilities within APKs and Android frameworks.

Key Responsibilities

Reverse engineer Android applications (APK files) written in Kotlin / Java

Analyze obfuscated code to identify malware, vulnerabilities, or other logic issues

Decompile, inspect, and understand source-level behavior using tools like JADX, Ghidra, or IDA

Conduct static and dynamic analysis of Android apps

Provide detailed technical reports outlining findings and recommended mitigations

Collaborate with security teams to enhance malware detection and threat intelligence

Nice to Have

Prior experience in security engineering, especially in mobile app security

Experience writing malware detection signatures or working on threat intel platforms

Coding background in Kotlin, Java, Python, or C / C++

Knowledge of encryption, obfuscation, and sandboxing techniques used in mobile malware

Required Experience

Proven experience reverse engineering Kotlin and / or Java code—either for malware analysis or debugging complex application behavior

Hands-on with tools like APKTool, JADX, Frida, Ghidra, Burp Suite, or similar

Solid understanding of Android internals and the APK structure

Experience with static and dynamic analysis techniques

Malware analysis experience specific to Android environments is highly preferred

Familiarity with smali code is a plus

serp_jobs.job_alerts.create_a_job

Reverse Engineer • Austin, TX, US