Mobile Reverse Engineer

Amatriot GroupBethesda, MD
7d$100,000 - $125,000Onsite

About The Position

Requirements: Mobile Software Reverse Engineering (with support to development and malware analysis efforts). Background: Conduct software exploitation against applications, middleware, operating systems (OS) user interface, OS drivers/runtimes, firmware and other binary data:

Requirements

  • Working experience in software engineering and related technologies.
  • Experience in sizing and scoping, in design, implementation and delivery of mobile application solutions using iOS and/or Android development environments.
  • Minimum 5 years with BS/BA; 3 years with MS/MA; 0 years with PhD. Bachelor's or Master's degree should be in one of these fields: Information Technology, Cybersecurity, Computer Science, Information Systems, Data Science, or Software Engineering.
  • Experience with Windows, Linux, Android, OS X, and iOS operating system & architecture.
  • Experience in computer or cell phone architecture, system internals, operating systems, and/or boot process software engineering.
  • Experience with static analysis tools such as IDA Pro, Ghidra and Binary Ninja.
  • Experience with debugging tools such as WinDbg.
  • Experience with virtualization, sandboxing, and emulation tools like VMware, KVM, QEMU and others.
  • Working knowledge of programming languages such as C, C++, .NET, Python, Java, etc.
  • Debug mobile applications' memory and performance issues.

Nice To Haves

  • Experience requiring a deep knowledge of Android and a strong passion in mobile industry and mobile development.
  • Experience developing/designing mobile phone platforms highly desired.
  • Experience in wireless API's (Wi-Fi, Bluetooth) preferred.
  • Engineer software scripts in C, C++, and Java with emphasis on prototyping and API extraction.
  • DoD 8570 Compliant, active IAT Level II certification.

Responsibilities

  • Provide malicious code reverse engineering to isolate, review, analyze, and reverse-engineer potentially malicious programs recovered from compromised computer systems and networks.
  • Research new trends, techniques, and packaging of malicious software to stay current and ready to identify and handle zero-day exploits.
  • Research behavior of binaries and share detailed understanding of how apps behave at memory/register level in support of technical exploitation operations.
  • Support efforts to design, prototype, document, test, conduct exploitation automation and transition code analysis methods and tools specific to technical exploitation operations.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service