Mid Level Android Reverse Engineer
Croatia, Croatia
Job Id:
149533
Job Category:
Job Location:
Croatia, Croatia
Security Clearance:
No Clearance
Business Unit:
Piper Companies
Division:
Piper Enterprise Solutions
Position Owner:
Brendan McGowan
Piper Companies is seeking an Mid Level Android Reverse Engineer to support a leading Global Cyber security company. This role is fully remote and will be focused on delivering high quality, high-speed analysis, deconstructing sophisticated android applications to understand their core functionality and unmask potential threat.
Essential Duties of the Mid Level Android Reverse Engineer:
- Deep Dive Analysis: Conduct analysis of Android applications with speed and accuracy to understand their codebase, architecture, and functionality.
- Reverse Engineering Techniques: Employ reverse engineering techniques to extract information from the android applications Risk Identification: Identify user and device risk, data leakage, and malicious code execution within Android apps.
- Security Assessment: Conduct security assessments of Android applications to identify potential risks.
- Threat Intelligence: Review apps and provide the latest malware trends Collaboration: Collaborate with security researchers, developers, and other stakeholders to share findings, provide recommendations, and contribute to the development of secure software.
- Continuous Learning: Stay updated on the latest Android security threats, vulnerabilities, and reverse engineering techniques.
Qualifications of the Mid Level Android Reverse Engineer:
- 3 - 5+ years experience in one or more of the following: Android Development, Reverse Engineering, Pentesting, Application Security Assessment
- Analyzing, unpacking, and reverse engineering code of malicious applications or SDKs.
- Ability to read, comprehend and analyze source code
- Static and Dynamic Analysis Techniques
- Reverse Engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis
- Java, Kotlin, JavaScript, Flutter, and other mobile software languages
- ELF (Native Binaries) reverse engineering
- Query languages such as SQL
- Understanding of the following topics
- Android Fundamentals such as Android activity lifecycles, common Android API usage, AOSP, and how an android application is created.
- Java and/or Kotlin Programing Language
- Techniques utilized by malicious software to harm the user’s device or their data
- Mobile App store policies (Ads, PHAs, Developer, etc.)
- Network traffic analysis; security fundamentals
Compensation for the Mid Level Android Reverse Engineer:
- $37-50/hr (based on experience)
- Fully Remote Role
This job opens for applications on 9/4/25. Applications for this job will be accepted for at least 30 days from the posting date
#LI-REMOTE
#LI-BM2
APK, DEX, Smali, Java bytecode, AndroidManifest.xml, resources.arsc, classes.dex, AAPT, ADB, Frida, JADX, Apktool, dex2jar, JD-GUI, Bytecode Viewer, Androguard, Ghidra, IDA Pro, Radare2, Burp Suite, SSL pinning, certificate pinning, hooking, instrumentation, static analysis, dynamic analysis, obfuscation, deobfuscation, code injection, patching, signature verification, root detection, anti-debugging, emulator detection, native libraries, JNI, NDK, libc, libart, system calls, syscall hooking, memory dump, heap analysis, stack trace, logcat, strace, ltrace, network traffic analysis, MITM, TLS interception, ProGuard, R8, code shrinking, code optimization, reflection, hidden APIs, hidden classes, runtime modification, shellcode, ARM assembly, Dalvik VM, ART runtime, boot.oat, oatdump, dexdump, ELF files, shared objects (.so), symbol resolution, function tracing, method swizzling, class loading, classpath, intent analysis, broadcast receivers, services, content providers, permissions, API calls, reverse engineering tools, malware analysis, app cloning, repackaging, tampering detection, signature spoofing, sandboxing, SELinux, SEAndroid, system partition, vendor partition, firmware extraction, bootloader, recovery image, fastboot, custom ROMs, Magisk, Xposed Framework, LSPosed, module injection, runtime hooking, syscall interception, native code analysis, binary diffing, patch diffing, control flow analysis, data flow analysis, taint analysis, symbolic execution, fuzzing, exploit development, CVE analysis, vulnerability research