Junior Android Reverse Engineer
Croatia, Croatia
Job Id:
149532
Job Category:
Job Location:
Croatia, Croatia
Security Clearance:
No Clearance
Business Unit:
Piper Companies
Division:
Piper Enterprise Solutions
Position Owner:
Brendan McGowan
Piper Companies is seeking an Junior Android Reverse Engineer to support a leading Global Cyber security company. This role is fully remote and will be focused on delivering high quality, high-speed analysis, deconstructing sophisticated android applications to understand their core functionality and unmask potential threat.
Essential Duties of the Junior Android Reverse Engineer:
- Deep Dive Analysis: Conduct analysis of Android applications with speed and accuracy to understand their codebase, architecture, and functionality.
- Reverse Engineering Techniques: Employ reverse engineering techniques to extract information from the android applications Risk Identification: Identify user and device risk, data leakage, and malicious code execution within Android apps.
- Security Assessment: Conduct security assessments of Android applications to identify potential risks.
- Threat Intelligence: Review apps and provide the latest malware trends Collaboration: Collaborate with security researchers, developers, and other stakeholders to share findings, provide recommendations, and contribute to the development of secure software.
- Continuous Learning: Stay updated on the latest Android security threats, vulnerabilities, and reverse engineering techniques.
Qualifications of the Junior Android Reverse Engineer:
- 1 - 3 years pf experience in one or more of the following: Android Development, Reverse Engineering, Pentesting, Application Security Assessments
- Analyzing or reverse engineering code, preferably of malicious applications
- Ability to read, comprehend and analyze source code
- Experience with Java or Kotlin
- Exposure to JavaScript, Flutter, and/or other mobile software languages
- Query languages such as SQL
- Preferred: Reverse Engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis
- ELF (Native Binaries) reverse engineering
Compensation for the Junior Android Reverse Engineer:
- $30-45/hr (based on experience)
- Fully Remote Role
This job opens for applications on 9/4/25. Applications for this job will be accepted for at least 30 days from the posting date
#LI-REMOTE
#LI-BM2
APK, DEX, Smali, Java bytecode, AndroidManifest.xml, resources.arsc, classes.dex, AAPT, ADB, Frida, JADX, Apktool, dex2jar, JD-GUI, Bytecode Viewer, Androguard, Ghidra, IDA Pro, Radare2, Burp Suite, SSL pinning, certificate pinning, hooking, instrumentation, static analysis, dynamic analysis, obfuscation, deobfuscation, code injection, patching, signature verification, root detection, anti-debugging, emulator detection, native libraries, JNI, NDK, libc, libart, system calls, syscall hooking, memory dump, heap analysis, stack trace, logcat, strace, ltrace, network traffic analysis, MITM, TLS interception, ProGuard, R8, code shrinking, code optimization, reflection, hidden APIs, hidden classes, runtime modification, shellcode, ARM assembly, Dalvik VM, ART runtime, boot.oat, oatdump, dexdump, ELF files, shared objects (.so), symbol resolution, function tracing, method swizzling, class loading, classpath, intent analysis, broadcast receivers, services, content providers, permissions, API calls, reverse engineering tools, malware analysis, app cloning, repackaging, tampering detection, signature spoofing, sandboxing, SELinux, SEAndroid, system partition, vendor partition, firmware extraction, bootloader, recovery image, fastboot, custom ROMs, Magisk, Xposed Framework, LSPosed, module injection, runtime hooking, syscall interception, native code analysis, binary diffing, patch diffing, control flow analysis, data flow analysis, taint analysis, symbolic execution, fuzzing, exploit development, CVE analysis, vulnerability research