Negotiable
Undetermined
Undetermined
Austin, Texas, United States
Summary: The role of Reverse Engineer Malware Analysis - Android involves conducting reverse engineering, security assessments, and code reviews to identify malware families affecting Android devices. The position requires collaboration and expertise in analyzing malicious applications and SDKs, as well as familiarity with various reverse engineering tools. Candidates should possess a relevant degree and have 3-5 years of hands-on experience in Android and reverse engineering. This contract role is based in Austin and offers an attractive rate.
Key Responsibilities:
- Review malicious applications and SDKs by analyzing, unpacking, and reverse engineering software that compromises Android devices.
- Review security policy violations, vulnerabilities, or improper coding practices.
- Research threats like APT using Open-Source Intelligence (Virus Total, Web, ExploitDB, MITRE, etc.).
- Conduct complex decompilation, unpacking, code review, and malicious mobile software reviews.
Key Skills:
- Associate's, Bachelor's, or Master's degree in computer science, computer engineering, CS, information systems, or a related discipline.
- 3-5 years of hands-on experience with Android and reverse engineering.
- In-depth understanding of Android internals and ability to read, comprehend, and analyze source code software.
- Familiarity with reverse engineering tools such as Jadx, Ghidra, Frida, IDA Pro, and Burp.
Salary (Rate): undetermined
City: Austin
Country: United States
Working Arrangements: undetermined
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT