We are seeking an experienced Android Malware Reverse Engineer to join our security research and malware analysis team. In this role, you will perform in-depth reverse engineering and security analysis of Android apps, SDKs, and binaries to uncover threats, identify malware families, and improve threat detection at scale. You will leverage both static and dynamic analysis techniques and work closely with developers, pen testers, and data analysts.
Most of the code that needs to be reviewed is usually written in JAVA or KOTLIN and uses such tools as Wireshark, Frida, etc for reverse engineering activities.
Description :
The Android Malware Reverse Engineers will conduct reverse engineering, security assessments, and code reviews.
You will conduct and assist with complex decompilation, unpacking, code review and malicious mobile software reviews.
The goal of the work is to identify families of malware and act on apps at scale.
You will be responsible for developing static and dynamic signatures for mobile code, binaries, and executable code leading to the detection of a variety of threat types including malware, potentially unwanted programs (PUPs) and advanced persistent threats.
Additionally, you will identify weaknesses in detections and automations and make recommendations for improvements in the detection process and automation pipeline.
You are required to write complex reports for consumption of non-technical audiences, review peer reports and assist with investigations.
Requirements :
Additional :
Nice to Have :
Professional Experience and Education
Required / Preferred :
Associates / Bachelor’s Degree / master’s in computer science, Computer engineering, CS, or information systems, or related discipline.
Atleast 2 years of hands on Android and reverse engineering
Reverse Engineer • Seattle, WA, US