Android Malware Reverse Engineer Offline
We search highly skilled Reverse Engineer with 8+ years of professional experience specializing in Android malware analysis, mobile threat intelligence, and application security research.
Experienced in dissecting malicious APKs, uncovering advanced obfuscation techniques, and identifying C2 mechanisms, data exfiltration flows, and persistence strategies.
Proficient in both static and dynamic analysis using tools such as JADX, Ghidra, IDA Pro, Frida, Radare2, Apktool, Wireshark, and Android Studio. Strong understanding of Java and Kotlin bytecode, Smali, Native libraries (ARM), and common Android
exploitation, evasion, and cloaking techniques.
Demonstrated ability to:
● Reverse engineer heavily obfuscated and packed Android applications
● Analyze droppers, packers, banking trojans, spyware, RATs, and stalkerware
● Bypass anti-analysis, anti-debugging, root detection, SSL pinning, and
anti-emulation mechanisms
● Extract IOCs and produce high-quality, actionable threat intelligence reports
● Develop detection signatures, behavioral indicators, and mitigation strategies
In addition, we are open to candidates with strong capabilities and proven experience in Windows malware investigation.
Relevant expertise includes static and dynamic analysis of PE files, unpacking and deobfuscation, reverse engineering with IDA Pro or Ghidra, debugging with x64dbg/WinDbg, memory forensics, API tracing, persistence mechanism analysis (registry, services, scheduled tasks), DLL hijacking, and privilege escalation.
Comfortable working in high-pressure environments, supporting incident response efforts, red team simulations, and proactive threat hunting initiatives. Combines deep technical expertise with strong documentation and reporting skills to translate complex
malware behavior into clear, actionable security insights.
Required languages
| English | C1 - Advanced |
The job ad is no longer active
Look at the current jobs Android →