Android Security Engineer at Piper Companies
Austin, Texas, USA -
Full Time


Start Date

Immediate

Expiry Date

03 Aug, 25

Salary

165000.0

Posted On

03 May, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Snort, Javascript, Ruby, Hacking, Droid, Code Auditing, Ida Pro, Ios, Java, Swift, Encryption, Scripting, Forensics, Sdk, Python, Keywords

Industry

Information Technology/IT

Description

Piper Companies is seeking an Android Security Engineer to support a leading Global Security Software Company. The Android Security Engineer will conduct and assist with reverse engineering, security assessments, and code reviews. The goal of this work is develop static and dynamic signatures for mobile code that detects application user threats including malware and PUPs. This job opens for applications on 4/18/2025. Applications for this job will be accepted for at least 30 days from the posting dates.

QUALIFICATIONS FOR THE ANDROID SECURITY ENGINEER INCLUDE:

  • Reverse Engineering Fundamentals:
  • Static Analysis - decompilation, dissasembly, code auditing
  • Dynamic Analysis - debugging monitoring, fuzzing
  • Sample Tools - IDA Pro, Ghidra, Radare2, Jadx, Fernflower, Smali, Baksmalu, ADB, JDWP, Android studio, bluestack, Frida, Wireshark, Cyberchef. HTTP interception, Yara, Snort
  • Programming (Java/Kotlin, Scripting, Javascript, Encode/Decode, encryption and decryption)
  • Android fundamentals (permissions, Manifest, Entry points, Broadcast receivers, exported activities, services, subclasses, Dalvik/ART Virtual machine)
    Compensation of the Android Security Engineer Includes:

Salary: $125,000 - $165,000

- - $60/hr - $79/hr Comprehensive Benefits: Medical, Dental, Vision, 401K, PTO, Sick Leave as required by law, and Holidays

Keywords: #LI-JD5 #LI-REMOTE
Reverse, hack, hacking, hacker, firmware, cybersecurity, droid, APK, SDK, forensic, forensics, IoS, Swift, Java, Python, Ruby, Javascript, Command line, command-lin

Responsibilities
  • Reverse engineering and assessing risk and user harm from potentially harmful applications
  • Conducting static and dynamic analysis
  • Providing assessment and evidence to support findings
  • Assessing detection and analysis gaps as well as scalable enforcement through detection rules
Loading...