NSS
NSS is currently hiring for an Android Malware Reverse Engineer to support a well-known client. This individual is required to be onsite 3 days a week with 2 days remote, in their respective locations including Austin, Texas, Bothell, WA, or San Jose, CA.
The Android Malware Reverse Engineers will conduct reverse engineering, security assessments, and code reviews. You will conduct and assist with complex decompilation, unpacking, code review, and malicious mobile software reviews. The goal of the work is to identify families of malware and act on apps at scale. You will be responsible for developing static and dynamic signatures for mobile code, binaries, and executable code leading to the detection of a variety of threat types including malware, potentially unwanted programs (PUPs), and advanced persistent threats. Additionally, you will identify weaknesses in detections and automations and make recommendations for improvements in the detection process and automation pipeline. You are required to write complex reports for consumption of non-technical audiences, review peer reports, and assist with investigations.
Requirements:
Hands-on experience with analyzing, unpacking, and reverse engineering code of malicious applications or SDKs. Experience with Static and Dynamic Analysis Techniques. Proficiency with reverse engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis. Knowledge of Java, Kotlin, JavaScript, Flutter, and other mobile software languages. Understanding of ELF (Native Binaries) reverse engineering. Ability to use query languages such as SQL. Understanding of the following topics:
Android fundamentals such as activity lifecycles, common API usage, AOSP, and app creation. Java and/or Kotlin programming languages. Techniques used by malicious software to harm devices or data. Mobile app store policies related to ads, PHA, and developer guidelines. Ability to read, comprehend, and analyze source code. Additional skills:
Development of signatures (e.g., Yara). Research on threats such as APT using OSINT sources like VirusTotal, ExploitDB, MITRE, etc. Knowledge of security engineering, network security, cryptography, rooting, packing, and network protocols. Nice to Have:
Experience with vulnerability analysis or security code review. Android software development experience. Background or familiarity with Google Ads or content moderation. Participation in Capture the Flag (CTF) competitions for mobile software. Pentesting, Blue Team, and/or Red Team experience. Relevant professional experience and education. Minimum Requirements:
None specified. Preferred Qualifications:
Associates/Bachelor’s/Master’s degree in computer science, engineering, or related fields. 3-5 years of hands-on experience with Android and reverse engineering.
#J-18808-Ljbffr
Hands-on experience with analyzing, unpacking, and reverse engineering code of malicious applications or SDKs. Experience with Static and Dynamic Analysis Techniques. Proficiency with reverse engineering tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK analysis. Knowledge of Java, Kotlin, JavaScript, Flutter, and other mobile software languages. Understanding of ELF (Native Binaries) reverse engineering. Ability to use query languages such as SQL. Understanding of the following topics:
Android fundamentals such as activity lifecycles, common API usage, AOSP, and app creation. Java and/or Kotlin programming languages. Techniques used by malicious software to harm devices or data. Mobile app store policies related to ads, PHA, and developer guidelines. Ability to read, comprehend, and analyze source code. Additional skills:
Development of signatures (e.g., Yara). Research on threats such as APT using OSINT sources like VirusTotal, ExploitDB, MITRE, etc. Knowledge of security engineering, network security, cryptography, rooting, packing, and network protocols. Nice to Have:
Experience with vulnerability analysis or security code review. Android software development experience. Background or familiarity with Google Ads or content moderation. Participation in Capture the Flag (CTF) competitions for mobile software. Pentesting, Blue Team, and/or Red Team experience. Relevant professional experience and education. Minimum Requirements:
None specified. Preferred Qualifications:
Associates/Bachelor’s/Master’s degree in computer science, engineering, or related fields. 3-5 years of hands-on experience with Android and reverse engineering.
#J-18808-Ljbffr