Home

Android Reverse Engineers :: TX - CA - WA :: C2H ::USC ,GC at Austin, Texas, USA
Email: [email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=2102742&uid=

From:

UTTAM BARMAN,

SONITALENTCORP

[email protected]

Reply to:   [email protected]

Job Title: Android Reverse Engineers

Location: Austin, TX / San Jose, CA / Bothell, WA (3 Days a week onsite)

Duration of project: 6 months+ (Contract-to-hire)

Required visa: USC and GC only

Must Have:

Have to have experience reverse engineering android apps written in Kotlin or JAVA to identify Malware

Have to be strong with reverse engineering of Android Apps.

The Android Malware Reverse Engineers will conduct reverse engineering, security assessments, and code reviews. You will conduct and assist with complex decompilation, unpacking, code review and malicious mobile software reviews. The goal of the work is to identify families of malware and act on apps at scale. You will be responsible for developing static and dynamic signatures for mobile code, binaries, and executable code leading to the detection of a variety of threat types including malware, potentially unwanted programs (PUPs) and advanced persistent threats. Additionally, you will identify weaknesses in detections and automations and make recommendations for improvements in the detection process and automation pipeline. You are required to write complex reports for consumption of non-technical audiences, review peer reports and assist with investigations.

Technical Skills:

Jadx, Ghidra, Frida, IDA Pro, Burp, Java, Kotlin, JavaScript, Flutter, ELF (Native Binaries), Android API,

AOSP, PHAs, APT (Open-Source Intelligence), Virus Total, ExploitDB, MITRE

Requirements:

Hands on Experience with the following: Analyzing, unpacking, and reverse engineering code of malicious applications or SDKs. Static and Dynamic Analysis Techniques Reverse Engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis Java, Kotlin, JavaScript, Flutter, and other mobile software languages ELF (Native Binaries) reverse engineering Query languages such as SQL

Understanding of the following topics Android Fundamentals such as Android activity lifecycles, common Android API usage, AOSP, and how an android application is created. Java and/or Kotlin Programing Language Techniques utilized by malicious software to harm the user s device or their data Mobile App store policies (Ads, PHAs, Developer, etc.)

Ability to read, comprehend and analyze source code

3-5 years of hands on Android and reverse engineering.

LinkedIn: https://www.linkedin.com/in/uttam-barman-b494b1254/

Email: [email protected]

Contact: 8599464061 

Keywords: green card California Texas Washington
Android Reverse Engineers :: TX - CA - WA :: C2H ::USC ,GC
[email protected]
http://bit.ly/4ey8w48
https://jobs.nvoids.com/job_details.jsp?id=2102742&uid=
[email protected]
View All
09:57 PM 22-Jan-25


To remove this job post send "job_kill 2102742" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]


Time Taken: 8

Location: Austin, Texas