Senior Android Malware Reverse Engineer

Company:  Nearshore Cyber
Location: San Francisco
Closing Date: 22/11/2024
Hours: Full Time
Type: Permanent
Job Requirements / Description
Job Description:

Senior Android Malware Reverse Engineer
Location: Onsite - San Francisco Bay Area, Austin, TX, or Bothell, WA. 
Hours: Full-time
Principals only. No recruiters or firms.

We are hiring an experienced Senior Android Malware Reverse Engineer to lead and contribute to high-impact mobile security projects. The ideal candidate will have a deep understanding of reverse engineering and the Android ecosystem, with several years of hands-on experience in analyzing malicious software.

Responsibilities:

Lead reverse engineering efforts for complex Android malware.

Perform in-depth static and dynamic analysis of malicious code.

Identify advanced persistent threats (APT) and develop detection strategies.

Mentor junior engineers and collaborate with cross-functional teams.

Improve malware detection processes and automation pipelines.

Requirements:

Expertise with reverse engineering tools like Jadx, Frida, Ghidra, and IDA Pro.

Strong knowledge of Android internals, malware techniques, and security practices.

Extensive experience with Java, Kotlin, and mobile application analysis.

Familiarity with developing Yara signatures and other detection tools.

5+ years of experience in Android reverse engineering.

Preferred:

Bachelor's or Masters degree in Computer Science or related field.

Experience with security research, vulnerability analysis, and malware detection.

Apply Now
Share this job
  • Similar Jobs

  • Junior Android Malware Reverse Engineer

    San Francisco
    View Job
  • Senior Android SDK Reverse Engineer

    San Francisco
    View Job
  • Mid-level Android SDK Reverse Engineer

    San Francisco
    View Job
  • Android Developer

    San Francisco
    View Job
  • Android Product Support Program Manager

    San Francisco
    View Job
An error has occurred. This application may no longer respond until reloaded. Reload 🗙