Urgent role : Title: Reverse Engineer Android at Remote, Remote, USA |
Email: [email protected] |
http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=1139188&uid= From: Gagan Khare, GVD Systems [email protected] Reply to: [email protected] Title: Reverse Engineer - Android Location: San Francisco Bay Area/Austin(Hybrid) Duration: 12 months Interview: Skype/Phone Job description: As a dedicated and collaborative Android Malware Reverse Engineer, you will conduct reverse engineering, security assessments, and code reviews. You will also conduct and assist with complex decompilation, unpacking, code review, and malicious mobile software reviews. The goal of the work is to identify families of malware and act on apps at scale. To give you an idea of how this Reverse Engineer Malware Analysis - Android role would look and feel, here are some things you could expect to do: Review malicious applications and SDKs by analyzing, unpacking, and reverse engineering software that compromises Android devices Review security policy violations, vulnerabilities, or improper coding practices Research threats like APT using Open-Source Intelligence (Virus Total, Web, ExploitDB, MITRE, etc.) You will also require 3-5 years of hands-on experience with Android and reverse engineering. In addition, you should have an in-depth understanding of Android internals and the ability to read, comprehend, and analyze source code software. Familiarity with reverse engineering tools such as Jadx, Ghidra, Frida, IDA Pro, and Burp to perform binary and APK analysis is also essential. Keywords: http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=1139188&uid= |
[email protected] View All |
02:34 AM 21-Feb-24 |