Android Developers

Job Category: Technology and IT
Job Type: Remote
Job Location: United States
Company Name: ewandzdigital Inc.

About the Role
We’re hiring multiple Android Malware Reverse Engineers to join a fast-moving security team focused on detecting and disrupting mobile threats at scale. You’ll analyze malicious apps and SDKs, develop static/dynamic signatures, and help improve detection and automation pipelines. This role is hands-on, technical, and impactful — your work will directly protect users and platforms from malware, PUPs, and advanced persistent threats.


What You’ll Do

  • Perform static and dynamic analysis of malicious Android apps and SDKs (APK and native binaries).

  • Decompile, unpack, and reverse-engineer malware with tools like JADX, Ghidra, IDA Pro, Frida, and Burp.

  • Develop detection signatures (Yara, heuristics) for mobile code, binaries, and executables.

  • Create robust static and runtime detection rules that scale across app stores and threat feeds.

  • Produce clear, actionable reports for technical and non-technical stakeholders.

  • Review peer reports, assist investigations, and advise on remediation and mitigation.

  • Identify gaps in current detections and automation; recommend and implement improvements for detection pipelines.

  • Conduct OSINT research on mobile APTs and threat actors using VirusTotal, MITRE, ExploitDB, and similar sources.


Must-Have Skills & Experience

  • Hands-on experience reversing Android apps, SDKs, and native ELF binaries.

  • Strong static and dynamic analysis skills (APK & native binary analysis).

  • Proficiency with reverse-engineering toolset: JADX, Ghidra, IDA Pro, Frida, Burp, etc.

  • Solid coding background in Java and Kotlin; familiarity with JavaScript, Flutter is a plus.

  • Experience writing unit-level and dynamic tests and using mock/interception tools (e.g., OkHttp/mitmproxy).

  • Knowledge of Android security, common tampering/persistence techniques, packing/obfuscation, and anti-analysis measures.

  • Comfortable reading and analyzing source code and compiled artifacts.

  • Experience developing signatures (e.g., Yara) and test harnesses for automated detection.


Helpful / Preferred Qualifications

  • Prior work with Google Ads, content moderation, or app-store policy enforcement.

  • Deep knowledge of security engineering: cryptography, authentication, rooting, packing, network protocols, and interception.

  • Experience with vulnerability analysis and exploitation research.

  • Exposure to Web/Cloud threat intelligence workflows and tools.

  • Capture-the-Flag (CTF)/mobile security competition experience or published research is a plus.

  • Familiarity with automated pipelines for threat ingestion and triage.


Why This Role Matters

You’ll be part of a team that protects millions of users by detecting emerging mobile threats and hardening detection systems. This is an opportunity to work at the intersection of research, engineering, and product protection — with lots of autonomy and a chance to shape detection strategy and tooling.


How to Apply

Please apply through the original job posting or the recruiter/contact listed in the posting. Include your resume and any relevant research, public GitHub repos, or published write-ups of reverse-engineering work.


Equal Opportunity Statement

We are an equal opportunity employer. Employment decisions are based on merit and business needs. All qualified applicants will receive consideration regardless of legally protected characteristics.


APPLY

Apply for this position

Allowed Type(s): .pdf, .doc, .docx