Mobile Reverse Engineer - EMEA Based Contractor at Vetric
, , Poland -
Full Time


Start Date

Immediate

Expiry Date

02 Mar, 26

Salary

0.0

Posted On

02 Dec, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Android Reverse Engineering, Mobile Malware Research, Java, Smali, APK Structure, Frida, Runtime Manipulation, Python Scripting, Anti-Analysis Evasion, Obfuscators, IDA Pro, Radare2, Static Analysis, Dynamic Analysis, Collaboration, Automation

Industry

Software Development

Description
Mobile Reverse Engineer (Android) Location: Europe (Remote) Team: Intelligence & Engineering Type: Contractor Are you ready to lead the way in revolutionizing industries with cutting-edge data solutions? At Vetric, we're not just another tech company - we’re shaping the future of data. We’re on a mission to empower businesses with the insights they need, driving digital transformation with innovative, high-impact solutions. We’re looking for a Reverse Engineer to shape the foundation of our mobile intelligence practice in our engineering team. This is a unique opportunity to join a fast-growing team and collaborate with an elite group of engineers, analysts, and builders. Why Vetric? Vetric is a leading provider of advanced public data API solutions. We streamline complex data collection with secure, real-time, fully managed data flows - delivering accurate, organized data with 99% uptime and minimal engineering effort. We are a bootstrap (profitable & non-funded) company, with 100+ clients and record-breaking ARR in less than 2 years. Role & Responsibilities: As a Reverse Engineer, your role will include: Reverse engineering major Android applications to extract strategic product intelligence. Working with tools such as Frida, JEB, Ghidra, IDA, and custom-built instrumentation frameworks. Analyzing obfuscation techniques, ARM-native binaries, and root/jailbreak detection mechanisms. Assessing architectural and functional changes across app versions. Developing internal tools and scripts to automate and scale static/dynamic analysis workflows. Collaborating with engineering and intelligence teams to turn technical findings into actionable insights. Note: All research is conducted strictly within legal and ethical boundaries. We do not engage in hacking or unauthorized access. Requirements Qualifications: 2+ years in Android reverse engineering, mobile malware research, or related low-level development roles. Strong proficiency in Android internals and Java, with working knowledge of Smali and APK structure. Deep understanding of Frida and runtime manipulation techniques on Android. A curiosity-driven mindset with a passion for exploring undocumented system behaviors and edge cases. We’d be lucky if you had: Familiarity with Python scripting for analysis automation. Experience with anti-analysis evasion, obfuscators, or commercial packers. Previous work with IDA Pro, Radare2, or other RE platforms. We hire people, not just skills. We encourage you to apply if you think this role is a great fit for you, even if you don’t meet 100% of the requirements.
Responsibilities
As a Reverse Engineer, you will reverse engineer major Android applications to extract strategic product intelligence and analyze obfuscation techniques. You will also collaborate with engineering and intelligence teams to turn technical findings into actionable insights.
Loading...