At a Glance
- Tasks: Uncover insights from Android apps through reverse engineering and collaboration.
- Company: Join a cutting-edge team focused on mobile intelligence solutions.
- Benefits: Competitive salary, flexible work options, and opportunities for professional growth.
- Why this job: Dive deep into mobile security and make a real impact in tech.
- Qualifications: 2+ years in Android reverse engineering and strong understanding of mobile security.
- Other info: Work in a dynamic environment with a focus on ethical research.
The predicted salary is between 36000 - 60000 £ per year.
Are you driven by uncovering what’s happening beneath the surface of mobile applications? This team builds advanced data and intelligence solutions that help organizations cut through noise, understand complex ecosystems, and make faster, better-informed decisions.
We’re looking for an Application Engineer to help establish and grow a mobile intelligence capability within a strong engineering group. This is a hands-on role for someone who enjoys deep technical work and collaborating closely with engineers and analysts to turn reverse engineering into real, usable insight.
You’ll Be Responsible For:
- Reverse engineering major Android applications to uncover strategic and behavioral insights
- Using tools such as Frida, JEB, Ghidra, IDA, and internal instrumentation frameworks
- Analyzing obfuscation techniques, ARM-native binaries, and root or jailbreak detection mechanisms
- Identifying architectural and functional changes across application versions
- Building internal tools and scripts to automate and scale static and dynamic analysis workflows
- Working closely with engineering and intelligence teams to translate technical findings into actionable outcomes
All research is conducted strictly within legal and ethical boundaries. This role does not involve hacking or unauthorized access.
Requirements:
- 2+ years of experience in Android reverse engineering, mobile security research, or low-level mobile development
- Strong understanding of Android internals and Java
- Practical experience working with Smali and APK structures
- Deep familiarity with Frida and runtime manipulation on Android
- A curiosity-driven mindset with an interest in undocumented behaviors and edge cases
Nice to Have:
- Python scripting for analysis automation
- Experience with obfuscation, anti-analysis techniques, or commercial packers
- Previous work with IDA Pro, Radare2, or similar reverse engineering platforms
Application Security Engineer employer: Snatch UP Jobs
Contact Detail:
Snatch UP Jobs Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Application Security Engineer
✨Tip Number 1
Network like a pro! Reach out to folks in the industry, attend meetups, and connect with other Application Security Engineers. You never know who might have the inside scoop on job openings or can refer you directly.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your reverse engineering projects or any tools you've built. This will give potential employers a taste of what you can do and set you apart from the crowd.
✨Tip Number 3
Prepare for technical interviews by brushing up on your knowledge of Android internals and reverse engineering techniques. Practice explaining your thought process while solving problems, as this will demonstrate your deep understanding and curiosity-driven mindset.
✨Tip Number 4
Don’t forget to apply through our website! We love seeing candidates who are genuinely interested in joining our team. Plus, it’s a great way to ensure your application gets the attention it deserves.
We think you need these skills to ace Application Security Engineer
Some tips for your application 🫡
Show Your Passion for Mobile Security: When writing your application, let us see your enthusiasm for mobile security and reverse engineering. Share any personal projects or experiences that highlight your curiosity and technical skills in this area.
Tailor Your CV to the Role: Make sure your CV reflects the specific skills and experiences mentioned in the job description. Highlight your experience with tools like Frida and Ghidra, and don’t forget to mention any relevant projects that showcase your expertise.
Craft a Compelling Cover Letter: Use your cover letter to tell us why you’re the perfect fit for this role. Discuss your hands-on experience with Android applications and how you’ve turned technical findings into actionable insights in the past.
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re serious about joining our team!
How to prepare for a job interview at Snatch UP Jobs
✨Know Your Tools Inside Out
Make sure you’re well-versed in the tools mentioned in the job description, like Frida, JEB, and Ghidra. Practise using them on sample applications to demonstrate your hands-on experience during the interview.
✨Showcase Your Curiosity
Prepare examples of how your curiosity has led you to uncover insights in previous projects. Discuss any undocumented behaviours or edge cases you've explored, as this aligns perfectly with the role's requirements.
✨Understand Android Internals
Brush up on your knowledge of Android internals and Java. Be ready to discuss how these concepts apply to reverse engineering and how they can help in identifying architectural changes across application versions.
✨Prepare for Technical Questions
Expect technical questions that test your understanding of obfuscation techniques and ARM-native binaries. Practise explaining complex concepts clearly, as you'll need to translate technical findings into actionable outcomes for the team.