Spotlight
Overview
Spotlight is seeking to hire an
Android Reverse Engineer
for a remote
12 month contract
position. This role is for an
Android Malware Reverse Engineer
on a threat research team. The primary goal is to conduct detailed static and dynamic analysis on malicious Android applications and SDKs to understand their behavior, classify them into malware families, and develop scalable detection signatures (e.g., Yara) to protect users. Responsibilities Conduct detailed static and dynamic analysis on Android applications and SDKs to understand behavior. Classify malware into families and develop scalable detection signatures (e.g., Yara). Collaborate with threat research teammates to improve detection and protection for users.
Qualifications
Required : 3+ years in Android Reverse Engineering (RE) and analysis of malicious applications or SDKs. Hands-on experience with RE tools:
Jadx, Ghidra, Frida, IDA Pro, Burp . Strong proficiency in
Static and Dynamic Analysis Techniques . Experience with
ELF (Native Binaries) reverse engineering . Strong understanding of
Android Fundamentals, activity lifecycles, AOSP, and API usage . Ability to
read, comprehend, and analyze source code . Experience with
Query languages (SQL) .
Preferred : Experience with
Vulnerability Analysis
or security code review. Android Software Development
experience. Familiarity with
Google Ads or Content Moderation . Participation in a
Capture the Flag (CTF)
for Mobile software. Pentesting, Blue Team, and/or Red Team
experience.
Application Instructions
Please attach a resume in Word format to your application.
Successful completion of a Background Check, Technical Assessment & Paired Programming Exercise is required. We do not sponsor candidates nor partner with subcontracting firms.
Thank you! Job Details
Seniority level: Mid-Senior level Employment type: Contract Job function: Information Technology Industries: IT Services and IT Consulting
Note: This description preserves the original role information while removing unrelated postings and boilerplate. If you need additional edits or a shorter version, let me know. #J-18808-Ljbffr
Spotlight is seeking to hire an
Android Reverse Engineer
for a remote
12 month contract
position. This role is for an
Android Malware Reverse Engineer
on a threat research team. The primary goal is to conduct detailed static and dynamic analysis on malicious Android applications and SDKs to understand their behavior, classify them into malware families, and develop scalable detection signatures (e.g., Yara) to protect users. Responsibilities Conduct detailed static and dynamic analysis on Android applications and SDKs to understand behavior. Classify malware into families and develop scalable detection signatures (e.g., Yara). Collaborate with threat research teammates to improve detection and protection for users.
Qualifications
Required : 3+ years in Android Reverse Engineering (RE) and analysis of malicious applications or SDKs. Hands-on experience with RE tools:
Jadx, Ghidra, Frida, IDA Pro, Burp . Strong proficiency in
Static and Dynamic Analysis Techniques . Experience with
ELF (Native Binaries) reverse engineering . Strong understanding of
Android Fundamentals, activity lifecycles, AOSP, and API usage . Ability to
read, comprehend, and analyze source code . Experience with
Query languages (SQL) .
Preferred : Experience with
Vulnerability Analysis
or security code review. Android Software Development
experience. Familiarity with
Google Ads or Content Moderation . Participation in a
Capture the Flag (CTF)
for Mobile software. Pentesting, Blue Team, and/or Red Team
experience.
Application Instructions
Please attach a resume in Word format to your application.
Successful completion of a Background Check, Technical Assessment & Paired Programming Exercise is required. We do not sponsor candidates nor partner with subcontracting firms.
Thank you! Job Details
Seniority level: Mid-Senior level Employment type: Contract Job function: Information Technology Industries: IT Services and IT Consulting
Note: This description preserves the original role information while removing unrelated postings and boilerplate. If you need additional edits or a shorter version, let me know. #J-18808-Ljbffr