Android Engineer

Overview

Remote
$60 - $70
Accepts corp to corp applications
Contract - Independent
Contract - W2

Skills

ADS
Authentication
Cryptography
Java
JavaScript
Kotlin
Malware Analysis
Microsoft Windows
Mobile Applications
Network Protocols
Network Security
Open Source

Job Details

Location: Austin, TX, San Jose, CA or Seattle, WA. Have to be located in one of these areas and be in the office 3 days a week.

Must have some US based experience.

Most of the code that needs to be reviewed is usually written in JAVA or KOTLIN and uses such tools as Wireshark, Frida, etc for reverse engineering activities.

An android web developer that is strong in JAVA or Kotlin

A Web app person that has done Pen Testing

A Malware Analyst this could be a Windows person that can be trained on the Android platform.

He would also like someone with SQL experience so they can write SQL code to query the data and look for common issues across all the malware issues that have been uncovered

Description:

The Android Malware Reverse Engineers will conduct reverse engineering, security assessments, and code reviews. You will conduct and assist with complex decompilation, unpacking, code review and malicious mobile software reviews. The goal of the work is to identify families of malware and act on apps at scale. You will be responsible for developing static and dynamic signatures for mobile code, binaries, and executable code leading to the detection of a variety of threat types including malware, potentially unwanted programs (PUPs) and advanced persistent threats. Additionally, you will identify weaknesses in detections and automations and make recommendations for improvements in the detection process and automation pipeline. You are required to write complex reports for consumption of non-technical audiences, review peer reports and assist with investigations.

Requirements:

Hands on Experience with the following:

Analyzing, unpacking, and reverse engineering code of malicious applications or SDKs.

Static and Dynamic Analysis Techniques

Reverse Engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis

Java, Kotlin, JavaScript, Flutter, and other mobile software languages

ELF (Native Binaries) reverse engineering

Query languages such as SQL

Understanding of the following topics

Android Fundamentals such as Android activity lifecycles, common Android API usage, AOSP, and how an android application is created.

Java and/or Kotlin Programing Language

Techniques utilized by malicious software to harm the user s device or their data

Mobile App store policies (Ads, PHAs, Developer, etc.)

Ability to read, comprehend and analyze source code

Additional:

Development of signatures (Yara, etc.)

Research on threats such as APT using Open-Source Intelligence (Virus Total, Web, ExploitDB, MITRE, etc.)

In depth knowledge of security engineering and analysis topics, computer and network security, cryptography, authentication security, rooting, packing, network protocols and interception

Nice to Have:

Experience with Vulnerability Analysis or security code review

Android Software Development Experience

Background / Familiarity with Google Ads or Content moderation

Participation in a Capture the Flag (CTF) for Mobile software

Pen testing, Blue Team, and/or Red Team experience

Professional Experience and Education

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.

About Cloud Bigdata