At a Glance
- Tasks: Conduct cutting-edge research on Android security and develop innovative prototypes.
- Company: Join a leading tech firm focused on Android security research.
- Benefits: Enjoy 25 days holiday, health benefits, and a supportive work environment.
- Other info: Opportunities for career growth and participation in exciting tech events.
- Why this job: Make a real impact in Android security while working with the latest technologies.
- Qualifications: Experience in Android security research and strong programming skills required.
The predicted salary is between 60000 - 80000 £ per year.
As an Android Security Researcher, you will be responsible for conducting cutting-edge research on the Android platform, developing working prototypes, reverse engineering (static and dynamic) and testing software to identify implementation vulnerabilities. Your expertise in Android internals, application modification, software modification, and firmware modification will enable you to analyse and understand the underlying mechanics of the Android ecosystem.
You will deliver complex projects working individually or within/leading a team, delivering industry-leading research and critical capabilities to our customers. Tasks may range from understanding Android and building AOSP, researching its internals for opportunities and its applications inside out, and not limited to network forensics, forensics, SRE both static and dynamically and building/pathing APKs. By their nature, these tasks are often objective-driven and require an inquisitive mindset to develop innovative solutions that may not be immediately obvious.
In this role, you will be researching new emerging technologies in Android to understand and evaluate features and functions that impact our customers. This includes identifying any vulnerabilities or opportunities in their implementation to design bespoke PoC solutions to take advantage of these. The role will also involve developing, modifying & building AOSP images for research and testing PoCs.
Our team use a wide range of tools and programming languages but of particular interest for this role are C/C++, Arm assembly and Frida with a focus on Android.
If you are currently working as an Android/iOS developer and have an interest in moving to security research and reverse engineering, we would be interested in having a chat.
You will have:
- Experience in Android security research or a related field
- In-depth knowledge of Android internals, including system services, APIs, and device drivers
- Proficiency with Frida, including scripting and API usage
- Static and Dynamic Analysis of Mobile Applications including Frida
- Experience building and customizing AOSP for research purposes
- Strong understanding of application modification, software modification, or firmware modification techniques
- Excellent programming skills in languages such as Java/Kotlin, C, C++, and Python
- Knowledge of low-level programming languages such as Assembly or ARM
- Strong analytical and problem-solving skills, with the ability to think creatively and outside the box
Nice to have:
- Experience with other mobile platforms (e.g., iOS, Harmony)
- Familiarity with Linux kernel development and debugging
- Participation in bug bounty programs or capture-the-flag (CTF) competitions
- Publications or presentations on Android security research topics
- Network and Protocol analysis
Work Benefits:
- Promotions are based on technical excellence and reviewed regularly
- 25 days holiday per year (with bank holidays on top), option to buy up to 5 days per year
- Level up with an extra day of holiday per year, up to an extra 5 days, starting from 2 years' service
- We offer financial support to cover HMRC allowable costs of relocating if you're moving to the area
- Training and development opportunities to support your career aspirations
- O'Reilly books subscription which provides access to a huge range of technical books
- Regular events including internal technical conferences, company socials and pizza-fuelled lunchtime seminars
- Free seasonal fruit, tea, coffee, milk, squash and hot chocolate
- Health benefits - Private medical including access to Private online GP, and a helpline to speak with various healthcare professionals.
- Physiotherapists, osteopaths or chiropractors for muscle, bone, and joint pain.
- Mental health - counselling, and specialist consultations and treatment with psychologists and cognitive behavioural therapists.
- Annual Health assessment.
Financial Benefits:
- A company bonus scheme so that everybody is rewarded for company success. This is an annual award that is based on the company hitting its targeted forecast. We have achieved this every year to date.
- 8% company contribution to pension with no minimum requirement for employee contribution.
- Death in Service cover of 4x base salary.
Lifestyle Benefits:
- Enhanced maternity/paternity/adoption leave: 12 weeks maternity leave at full pay as soon as you join, further enhanced to 20 weeks full pay from 2 years' service. 2 weeks paternity leave at full pay as soon as you join, further enhanced to 4 weeks full pay from 2 years' service.
- Enhanced cycle-to-work scheme including the ability to purchase a bike over £1,000 (e-bikes, specialist cycles and trikes allowed).
Android Security Researcher in Cheltenham employer: CoreTech Security
Contact Detail:
CoreTech Security Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Android Security Researcher in Cheltenham
✨Tip Number 1
Network like a pro! Reach out to folks in the Android security community, attend meetups, and join online forums. The more connections we make, the better our chances of landing that dream job.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your research projects, prototypes, or any cool hacks you've done. This is a great way for us to demonstrate our expertise and stand out from the crowd.
✨Tip Number 3
Practice makes perfect! Get hands-on with reverse engineering and vulnerability testing. Use tools like Frida and AOSP to build your own projects. The more experience we have, the more confident we'll be in interviews.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who are genuinely interested in joining our team and contributing to cutting-edge research.
We think you need these skills to ace Android Security Researcher in Cheltenham
Some tips for your application 🫡
Show Off Your Skills: Make sure to highlight your experience with Android internals and security research. We want to see your expertise in action, so don’t hold back on showcasing your projects or any cool prototypes you've developed!
Tailor Your Application: Customise your application to fit the role. Use keywords from the job description, like 'reverse engineering' and 'AOSP', to show us you understand what we're looking for. This helps us see how you can contribute to our team.
Be Inquisitive: We love a curious mind! In your application, share examples of how you've tackled complex problems or explored new technologies. This will give us a glimpse into your innovative thinking and problem-solving skills.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to keep track of your application and ensure it gets the attention it deserves. Plus, we’re excited to see what you bring to the table!
How to prepare for a job interview at CoreTech Security
✨Know Your Android Internals
Make sure you brush up on your knowledge of Android internals, including system services and APIs. Be prepared to discuss how these components interact and any vulnerabilities you've identified in the past.
✨Showcase Your Reverse Engineering Skills
Bring examples of your work with reverse engineering, especially using tools like Frida. If you have scripts or prototypes you've developed, be ready to explain your thought process and the challenges you faced.
✨Demonstrate Problem-Solving Abilities
Prepare to tackle hypothetical scenarios during the interview. Think about how you would approach identifying vulnerabilities or developing PoC solutions. Show them your analytical mindset and creativity!
✨Familiarise Yourself with AOSP
Since building and modifying AOSP is a key part of the role, make sure you understand the process. Discuss any projects where you've customised AOSP and what you learned from those experiences.