Android Malware Reverse Engineer
Listed on 2025-10-19
-
IT/Tech
Cybersecurity, Data Security, IT Consultant
NSS is currently hiring for an Android Malware Reverse Engineer to support a well-known client. This individual is required to be onsite 3 days a week with 2 days remote, in their respective locations including Austin, Texas, Bothell, WA, or San Jose, CA.
The Android Malware Reverse Engineers will conduct reverse engineering, security assessments, and code reviews. You will conduct and assist with complex decompilation, unpacking, code review, and malicious mobile software reviews. The goal of the work is to identify families of malware and act on apps will be responsible for developing static and dynamic signatures for mobile code, binaries, and executable code leading to the detection of a variety of threat types including malware, potentially unwanted programs (PUPs), and advanced persistent threats.
Additionally, you will identify weaknesses in detections and automations and make recommendations for improvements in the detection process and automation pipeline. You are required to write complex reports for consumption of non-technical audiences, review peer reports, and assist with investigations.
- Hands-on experience with analyzing, unpacking, and reverse engineering code of malicious applications or SDKs.
- Experience with Static and Dynamic Analysis Techniques.
- Proficiency with reverse engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis.
- Knowledge of Java, Kotlin, JavaScript, Flutter, and other mobile software languages.
- Understanding of ELF (Native Binaries) reverse engineering.
- Ability to use query languages such as SQL.
- Android fundamentals such as activity life cycles, common API usage, AOSP, and app creation.
- Java and/or Kotlin programming languages.
- Techniques used by malicious software to harm devices or data.
- Mobile app store policies related to ads, PHA, and developer guidelines.
- Ability to read, comprehend, and analyze source code.
- Development of signatures (e.g., Yara).
- Research on threats such as APT using OSINT sources like Virus Total, Exploit
DB, MITRE, etc. - Knowledge of security engineering, network security, cryptography, rooting, packing, and network protocols.
- Experience with vulnerability analysis or security code review.
- Android software development experience.
- Background or familiarity with Google Ads or content moderation.
- Participation in Capture the Flag (CTF) competitions for mobile software.
- Pentesting, Blue Team, and/or Red Team experience.
- Relevant professional experience and education.
- None specified.
- Associates/Bachelor’s/Master’s degree in computer science, engineering, or related fields.
- 3-5 years of hands-on experience with Android and reverse engineering.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).