Enable job alerts via email!

Mid Level Android Reverse Engineer

Piper Companies

United States

Remote

USD 100,000 - 125,000

Full time

Today
Be an early applicant

Job summary

A leading technology security firm is seeking a Mid Level Android Reverse Engineer to work remotely. This role involves conducting deep analysis of Android applications, using reverse engineering techniques, and performing security assessments. Candidates should have 3-5+ years of experience in relevant fields such as Android Development or Application Security. Competitive hourly compensation offered based on experience.

Qualifications

  • 3 - 5+ years experience in Android Development or Reverse Engineering.
  • Ability to analyze source code and unpack malicious applications.
  • Familiarity with mobile app store policies and security fundamentals.

Responsibilities

  • Conduct analysis of Android applications with speed and accuracy.
  • Employ reverse engineering techniques to extract application information.
  • Conduct security assessments to identify potential risks.

Skills

Android Development
Reverse Engineering
Pentesting
Application Security Assessment
Static and Dynamic Analysis Techniques
Java
Kotlin
JavaScript
SQL
Network Traffic Analysis

Tools

Jadx
Ghidra
Frida
IDA Pro
Burp
Job description
Overview

Piper Companies is seeking a Mid Level Android Reverse Engineer to support a leading Global Cyber security company. This role is fully remote and will be focused on delivering high quality, high-speed analysis, deconstructing sophisticated android applications to understand their core functionality and unmask potential threat.

Responsibilities
  • Deep Dive Analysis: Conduct analysis of Android applications with speed and accuracy to understand their codebase, architecture, and functionality.
  • Reverse Engineering Techniques: Employ reverse engineering techniques to extract information from the Android applications. Risk Identification: Identify user and device risk, data leakage, and malicious code execution within Android apps.
  • Security Assessment: Conduct security assessments of Android applications to identify potential risks.
  • Threat Intelligence: Review apps and provide the latest malware trends. Collaboration: Collaborate with security researchers, developers, and other stakeholders to share findings, provide recommendations, and contribute to the development of secure software.
  • Continuous Learning: Stay updated on the latest Android security threats, vulnerabilities, and reverse engineering techniques.
Qualifications
  • 3 - 5+ years experience in one or more of the following: Android Development, Reverse Engineering, Pentesting, Application Security Assessment
  • Analyzing, unpacking, and reverse engineering code of malicious applications or SDKs.
  • Ability to read, comprehend and analyze source code
  • Static and Dynamic Analysis Techniques
  • Reverse Engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis
  • Java, Kotlin, JavaScript, Flutter, and other mobile software languages
  • ELF (Native Binaries) reverse engineering
  • Query languages such as SQL
  • Understanding of the following topics
  • Android Fundamentals such as Android activity lifecycles, common Android API usage, AOSP, and how an android application is created.
  • Java and/or Kotlin Programing Language
  • Techniques utilized by malicious software to harm the user’s device or their data
  • Mobile App store policies (Ads, PHAs, Developer, etc.)
  • Network traffic analysis; security fundamentals
Compensation
  • $37-50/hr (based on experience)
  • Fully Remote Role

This job opens for applications on 9/4/25. Applications for this job will be accepted for at least 30 days from the posting date

#LI-REMOTE

#LI-BM2

APK, DEX, Smali, Java bytecode, AndroidManifest.xml, resources.arsc, classes.dex, AAPT, ADB, Frida, JADX, Apktool, dex2jar, JD-GUI, Bytecode Viewer, Androguard, Ghidra, IDA Pro, Radare2, Burp Suite, SSL pinning, certificate pinning, hooking, instrumentation, static analysis, dynamic analysis, obfuscation, deobfuscation, code injection, patching, signature verification, root detection, anti-debugging, emulator detection, native libraries, JNI, NDK, libc, libart, system calls, syscall hooking, memory dump, heap analysis, stack trace, logcat, strace, ltrace, network traffic analysis, MITM, TLS interception, ProGuard, R8, code shrinking, code optimization, reflection, hidden APIs, hidden classes, runtime modification, shellcode, ARM assembly, Dalvik VM, ART runtime, boot.oat, oatdump, dexdump, ELF files, shared objects (.so), symbol resolution, function tracing, method swizzling, class loading, classpath, intent analysis, broadcast receivers, services, content providers, permissions, API calls, reverse engineering tools, malware analysis, app cloning, repackaging, tampering detection, signature spoofing, sandboxing, SELinux, SEAndroid, system partition, vendor partition, firmware extraction, bootloader, recovery image, fastboot, custom ROMs, Magisk, Xposed Framework, LSPosed, module injection, runtime hooking, syscall interception, native code analysis, binary diffing, patch diffing, control flow analysis, data flow analysis, taint analysis, symbolic execution, fuzzing, exploit development, CVE analysis, vulnerability research

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.