At a Glance
- Tasks: Reverse engineer Android apps and conduct vulnerability assessments in a dynamic environment.
- Company: Join IOActive, a leader in cybersecurity with a collaborative culture.
- Benefits: Competitive pay, performance incentives, travel opportunities, and access to top technical teams.
- Other info: Remote position with excellent growth opportunities in a fast-paced team.
- Why this job: Make a real impact in cybersecurity while working on exciting challenges.
- Qualifications: 3-5 years of experience in security, strong analytical skills, and ability to work independently.
The predicted salary is between 60000 - 80000 ÂŁ per year.
About IOActive: IOActive, a trusted partner for Global 1000 enterprises, provides research-fueled security services across all industries. Our cutting-edge cybersecurity teams provide highly specialized technical and programmatic services including full-stack penetration testing, program efficacy assessments, and hardware hacking. IOActive brings a unique attacker’s perspective to every engagement to maximize cybersecurity investments and improve the security posture and operational resiliency of our clients. Founded in 1998, IOActive is headquartered in Seattle with global operations, including state of the art hardware hacking labs in Seattle, WA, Madrid, Spain and Cheltenham, UK.
Who you are: An IOActive Android App Malware Reverse Engineer leverages their skills to make conclusive statements about specific security and privacy questions asked off selected Android Apps, as part of an effort to keep third-party app stores safe. The candidate will be working at the highest escalation level, only handling engaging, challenging questions that could not be answered by lower malware analysis tiers. The candidate will be part of a structured team, working with Technical Project Managers and Team Leads. The nature and scale of the work ensures a fast-paced, dynamic and engaging environment, with a strong opportunity of further technical growth and training on the job.
What you'll do:
- Reverse engineering of Android apps
- Java-based apps
- Native code is a strong plus
- Work with the Android platform and its security mechanisms
- Conduct vulnerability assessments and penetration testing
What you'll bring:
- Ability to work independently under deadline
- Knowledge of security-related topics, such as authentication, entitlements, identity management, data protection, data leakage prevention, validation checking, encryption, hashing, principle of least privilege, software attack methodologies, secure data transfer, secure data storage
- Rigorous attention to detail and strong analytic skills
- Ability to write test plans based upon initial impressions and discussions with the team
- Comfortable navigating large codebases with minimal guidance
- Excellent command of written and spoken English
- Comfortable working as part of a multinational and multidisciplinary team
- Logical and structured approach to projects
- 3-5 years or more of relevant work experience in a high-paced, enterprise consulting environment
What we offer:
- A chance to work with an industry leader in cybersecurity
- Access to world-class technical teams and research
- A high-energy, collaborative team that values innovation
- Opportunities for travel
- Competitive compensation and performance-based incentives
If this sounds like your kind of challenge, we’d love to hear from you. Let’s talk! This is a remote position so salary will be based on local market rates.
Why IOActive: We have over 25 years of experience that’s established and stable; yet high-growth with the energy, passion and dynamic work environment of a startup. We are renowned for our innovation and thought leadership within our high-profile, cutting edge space. We're one of “the good guys” doing crazy cool stuff to thwart bad guys in a critically important business, social and political arena. Our work is great fun with great importance. Above all else, we value our people and our customers. Relationships matter.
IOActive is an equal opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination and harassment of any kind based on race, color, sex, religion, sexual orientation, national origin, disability, genetic information, pregnancy, or any other protected characteristic as outlined by federal, state, or local laws. This policy applies to all employment practices within our organization, including hiring, recruiting, promotion, termination, layoff, recall, leave of absence, compensation, benefits, training, and apprenticeship. IOActive makes hiring decisions based solely on qualifications, merit, and business needs at the time.
Android App Malware Reverse Engineer (Remote) employer: "Making the world a safer and more secure place"
Contact Detail:
"Making the world a safer and more secure place" Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Android App Malware Reverse Engineer (Remote)
✨Tip Number 1
Network like a pro! Reach out to folks in the cybersecurity field, especially those who work at IOActive or similar companies. A friendly chat can open doors and give you insights that might just land you an interview.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your reverse engineering projects or any relevant work. This is your chance to demonstrate your expertise and passion for Android app security.
✨Tip Number 3
Prepare for technical interviews by brushing up on your knowledge of security mechanisms and malware analysis techniques. Practice explaining your thought process clearly, as communication is key in a collaborative environment.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining the IOActive team.
We think you need these skills to ace Android App Malware Reverse Engineer (Remote)
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the role of Android App Malware Reverse Engineer. Highlight your relevant experience, especially in reverse engineering and security topics. We want to see how your skills align with what we do at IOActive!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background makes you a great fit for our team. Let us know what excites you about working with IOActive.
Showcase Your Projects: If you've worked on any relevant projects or have a portfolio, make sure to include that in your application. We love seeing practical examples of your work, especially if they relate to Android apps or malware analysis.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows us you’re keen to join our team!
How to prepare for a job interview at "Making the world a safer and more secure place"
✨Know Your Stuff
Make sure you brush up on your knowledge of Android app security and malware analysis. Familiarise yourself with the latest vulnerabilities and security mechanisms in the Android platform. Being able to discuss specific examples will show that you're not just knowledgeable but also passionate about the field.
✨Showcase Your Analytical Skills
Prepare to demonstrate your analytical skills during the interview. You might be asked to solve a problem or analyse a piece of code on the spot. Practising reverse engineering tasks beforehand can help you feel more confident and ready to tackle any challenges they throw your way.
✨Ask Insightful Questions
Interviews are a two-way street, so come prepared with thoughtful questions about the team dynamics, ongoing projects, and the tools they use. This not only shows your interest in the role but also helps you gauge if the company culture aligns with your values.
✨Highlight Your Teamwork Experience
Since you'll be working as part of a structured team, it's important to highlight your experience collaborating with others. Share examples of how you've successfully worked in multidisciplinary teams and how you handle feedback and communication in a remote setting.