Piper Companies is seeking a
Fully Remote Reverse Engineer for a leading Global Security Software Company. The
Reverse Engineer will conduct and assist with reverse engineering, security assessments, and code reviews. The goal of this work is develop static and dynamic signatures for mobile code that detects application user threats in the Google Play Store including malware and PUPs.
Responsibilities of the Reverse Engineer Include:
- Review of applications and SDKs to detect threats and reverse engineer software that compromises Android devices.
- Static and Dynamic Analysis
- Experience with tools such as Jadx, Ghidra, Frida, IDA Pro, Burp, to perform binary and APK/SDK analysis
- Code reviews for security policy violations, vulnerabilities, or improper coding practices
- Advanced knowledge of Java, Kotlin, JavaScript, and other mobile software languages.
Qualifications for the Reverse Engineer Include:
- 3+ years of hands-on Android development and reverse engineering
- In depth understanding/ experience in Android internals
- Techniques utilized by malicious software to tamper with user devices
- Android Security Topics
- Mobile App store policies (Ads, PHAs, Developer, etc.)
Compensation of the Reverse Engineer include:
- Salary Range: $165,000 - $190,000 **depending on Experience**
- Full Benefits: PTO, Paid Holidays, Cigna Medical, Dental, Vision, 401K
Keywords: Reverse Engineer, Reverse Engineering, Engineering, Software Engineer, Android Engineer, Android, Mobile Phones, Apps, Applications, Code, Coding, Code Reviews, Code Development, Apple store, Google, Google play, Google applications, Static analysis, dynamic analysis, Java, Java Developer, SDK, Jadx, Ghirda, Frida, Work from home, WFH, Cyber Security, Software development, mobile applications, Cyber, decompilation, security assessments, malware, hackers, ransoware, software reviews, mobile code, binaries, PUPs, PUP, Potentially unwanted programs, Android devices, IDA Pro, Burp, APK, APK Analysis, Kotlin, JavaScript, Mobile software, Yara, APT, Virus total, web, ExploitDB, Mitre, computer security, cryptograpy, rooting, packing, network protocols, vulnerability analysis, capture the flag