Android Malware Reverse Engineer Offline

ITG Verified Employer Responds Quickly

We search highly skilled Reverse Engineer with 8+ years of professional experience specializing in  Android malware analysis, mobile threat intelligence, and application security research.  
Experienced in dissecting malicious APKs, uncovering advanced obfuscation techniques, and identifying C2 mechanisms, data exfiltration flows, and persistence strategies. 
 

Proficient in both static and dynamic analysis using tools such as JADX, Ghidra, IDA Pro, Frida, Radare2, Apktool, Wireshark, and Android Studio. Strong understanding of Java and Kotlin bytecode, Smali, Native libraries (ARM), and common Android 
exploitation, evasion, and cloaking techniques. 
 

Demonstrated ability to: 


● Reverse engineer heavily obfuscated and packed Android applications 
● Analyze droppers, packers, banking trojans, spyware, RATs, and stalkerware 
● Bypass anti-analysis, anti-debugging, root detection, SSL pinning, and 
anti-emulation mechanisms 
● Extract IOCs and produce high-quality, actionable threat intelligence reports 
● Develop detection signatures, behavioral indicators, and mitigation strategies 
 

In addition, we are open to candidates with strong capabilities and proven experience in Windows malware investigation.  
Relevant expertise includes static and dynamic analysis of PE files, unpacking and deobfuscation, reverse engineering with IDA Pro or Ghidra, debugging with x64dbg/WinDbg, memory forensics, API tracing, persistence mechanism analysis (registry, services, scheduled tasks), DLL hijacking, and privilege escalation. 
Comfortable working in high-pressure environments, supporting incident response efforts, red team simulations, and proactive threat hunting initiatives. Combines deep technical expertise with strong documentation and reporting skills to translate complex 
malware behavior into clear, actionable security insights.

Required languages

English C1 - Advanced

The job ad is no longer active

Look at the current jobs Android →

Loading...