- Company Name
- Source Group International
- Job Title
- Reverse Engineer - Android
- Job Description
-
Job Title: Reverse Engineer – Android
Role Summary: Conduct reverse engineering, security assessments, and code reviews of Android mobile software to identify malware families, develop signatures, and support investigations at scale.
Expectations: • 1‑5 years of hands‑on Android reverse engineering experience
• 12‑month contract, remote work
• Ability to produce clear, non‑technical reports and collaborate with peers
Key Responsibilities
- Analyze malicious Android applications and SDKs via unpacking and reverse engineering
- Perform static and dynamic analysis on binaries and APKs using Jadx, Ghidra, Frida, IDA Pro, Burp, etc.
- Identify security policy violations, vulnerabilities, and improper coding practices through code reviews
- Develop Yara signatures and leverage open‑source intelligence (VirusTotal, ExploitDB, MITRE, etc.) for detection
- Write detailed reports for non‑technical audiences to support investigative efforts
- Contribute to enhancing detection processes and reviewing peer findings
Required Skills
- Experience with ELF (native binaries) reverse engineering
- Deep understanding of Android internals and security topics
- Familiarity with malware tampering techniques (rooting, packing, network interception)
- Proficiency with reverse engineering tools (Jadx, Ghidra, Frida, IDA Pro, Burp)
- Ability to develop Yara signatures and use open‑source intelligence tools
- Strong knowledge of mobile app store policies (ads, PHAs, developer requirements)
- Proficiency in Java, Kotlin, JavaScript, Flutter, and mobile software languages
- In‑depth knowledge of security engineering, cryptography, authentication security, and rooting
Required Education & Certifications
- Preferred: Associate's, Bachelor's, or Master's degree in Computer Science, Computer Engineering, or related discipline
- No specific certifications required, but professional experience in Android reverse engineering is preferred.