Android Reverse Engineer

Hudson Manpower

  • Austin, TX
  • Contract
  • Full-time
  • 6 days ago
  • Apply easily
For over half a decade, Hudson Manpower has been a trusted partner in delivering specialized talent and technology solutions across IT, Energy, and Engineering industries worldwide. We work closely with startups, mid-sized firms, and Fortune 500 clients to support their digital transformation journeys. Our teams are empowered to bring fresh ideas, shape innovative solutions, and drive meaningful impact for our clients. If you're looking to grow in an environment where your expertise is valued and your voice matters, then Hudson Manpower is the place for you. Join us and collaborate with forward thinking professionals who are passionate about building the future of work.OverviewWe are seeking a highly skilled Android Reverse Engineer with strong expertise in analyzing Android applications at a code level. This role is not for standard Android developers—we require someone experienced in reverse engineering Kotlin or Java code, ideally to identify malware or other security vulnerabilities within APKs and Android frameworks.Key ResponsibilitiesReverse engineer Android applications (APK files) written in Kotlin/JavaAnalyze obfuscated code to identify malware, vulnerabilities, or other logic issuesDecompile, inspect, and understand source-level behavior using tools like JADX, Ghidra, or IDAConduct static and dynamic analysis of Android appsProvide detailed technical reports outlining findings and recommended mitigationsCollaborate with security teams to enhance malware detection and threat intelligenceNice to HavePrior experience in security engineering, especially in mobile app securityExperience writing malware detection signatures or working on threat intel platformsCoding background in Kotlin, Java, Python, or C/C++Knowledge of encryption, obfuscation, and sandboxing techniques used in mobile malwareRequired ExperienceProven experience reverse engineering Kotlin and/or Java code—either for malware analysis or debugging complex application behaviorHands-on with tools like APKTool, JADX, Frida, Ghidra, Burp Suite, or similarSolid understanding of Android internals and the APK structureExperience with static and dynamic analysis techniquesMalware analysis experience specific to Android environments is highly preferredFamiliarity with smali code is a plus

Hudson Manpower