The ideal candidate demonstrates a positive, proactive attitude and excels as a reliable team player with strong technical skills in Android malware analysis.
Key Responsibilities:
Conduct in-depth Android malware research and reverse engineering.
Detect and document emerging Android malware trends and attack vectors.
Analyze Android applications for malicious behavior.
Write detection rules and develop automation processes for Android malware identification.
Collaborate with team members and share knowledge across departments.
Perform static and dynamic analysis of Android malware samples.
Document findings and contribute to threat intelligence reports.
Must-Have:
At least 3 years of proven experience in one of the following:
Research in Android/Windows/Mac/Linux.
Low-level reverse engineering or development.
Proficiency in one or more programming languages: Java, Python, JavaScript, or C/C++.
Experience with reverse engineering tools and decompilers (e.g. JADX, JEB, IDA Pro, Ghidra).
Familiarity with instrumentation tools like Frida or debugging tools such as GDB/LLDB.
Understanding of networking fundamentals and protocols.
Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction.
Nice-to-Have:
Experience with Android development.
Familiarity with Android frameworks, including Flutter, React Native, or Unity.
Understanding of Android application security.
Familiarity with the Android malware ecosystem and techniques.
Experience in building automated tools.
Experience with writing detailed reports in English.












