At a Glance
- Tasks: Reverse engineer Android apps to uncover insights and enhance mobile security.
- Company: Join a cutting-edge team focused on mobile intelligence solutions.
- Benefits: Competitive salary, flexible work options, and opportunities for professional growth.
- Why this job: Dive deep into mobile tech and make a real impact in security.
- Qualifications: 2+ years in Android reverse engineering and strong Java skills.
- Other info: Collaborative environment with a focus on ethical research and innovation.
The predicted salary is between 36000 - 60000 £ per year.
Are you driven by uncovering what’s happening beneath the surface of mobile applications? This team builds advanced data and intelligence solutions that help organizations cut through noise, understand complex ecosystems, and make faster, better-informed decisions.
We’re looking for an Application Engineer to help establish and grow a mobile intelligence capability within a strong engineering group. This is a hands-on role for someone who enjoys deep technical work and collaborating closely with engineers and analysts to turn reverse engineering into real, usable insight.
You’ll Be Responsible For:
- Reverse engineering major Android applications to uncover strategic and behavioral insights
- Using tools such as Frida, JEB, Ghidra, IDA, and internal instrumentation frameworks
- Analyzing obfuscation techniques, ARM-native binaries, and root or jailbreak detection mechanisms
- Identifying architectural and functional changes across application versions
- Building internal tools and scripts to automate and scale static and dynamic analysis workflows
- Working closely with engineering and intelligence teams to translate technical findings into actionable outcomes
All research is conducted strictly within legal and ethical boundaries. This role does not involve hacking or unauthorized access.
Requirements:
- 2+ years of experience in Android reverse engineering, mobile security research, or low-level mobile development
- Strong understanding of Android internals and Java
- Practical experience working with Smali and APK structures
- Deep familiarity with Frida and runtime manipulation on Android
- A curiosity-driven mindset with an interest in undocumented behaviors and edge cases
Nice to Have:
- Python scripting for analysis automation
- Experience with obfuscation, anti-analysis techniques, or commercial packers
- Previous work with IDA Pro, Radare2, or similar reverse engineering platforms
Application Security Engineer in London employer: Snatch UP Jobs
Contact Detail:
Snatch UP Jobs Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Application Security Engineer in London
✨Tip Number 1
Network, network, network! Reach out to folks in the industry, attend meetups, and connect with people on LinkedIn. You never know who might have a lead on your dream Application Security Engineer role.
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your reverse engineering projects or any tools you've built. This is a great way to demonstrate your hands-on experience and technical prowess to potential employers.
✨Tip Number 3
Prepare for technical interviews by brushing up on your knowledge of Android internals and reverse engineering tools like Frida and Ghidra. Practice explaining your thought process while solving problems, as this will help you stand out during interviews.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for passionate individuals who want to dive deep into mobile security. Your next big opportunity could be just a click away!
We think you need these skills to ace Application Security Engineer in London
Some tips for your application 🫡
Show Your Passion for Mobile Security: When writing your application, let us see your enthusiasm for mobile security and reverse engineering. Share any personal projects or experiences that highlight your curiosity and skills in this area. We love candidates who are genuinely excited about what they do!
Tailor Your CV and Cover Letter: Make sure to customise your CV and cover letter to match the job description. Highlight your experience with Android internals, tools like Frida and Ghidra, and any relevant projects. This helps us see how you fit into our team and the role.
Be Clear and Concise: Keep your application clear and to the point. Use bullet points where possible to make it easy for us to read through your qualifications and experiences. We appreciate straightforward communication that gets right to the heart of your skills.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re serious about joining our team at StudySmarter!
How to prepare for a job interview at Snatch UP Jobs
✨Know Your Tools Inside Out
Make sure you’re well-versed in the tools mentioned in the job description, like Frida, JEB, and Ghidra. Practise using them on sample applications to demonstrate your hands-on experience during the interview.
✨Showcase Your Reverse Engineering Skills
Prepare to discuss specific projects where you've reverse engineered Android applications. Be ready to explain your thought process, the challenges you faced, and how you overcame them. This will show your problem-solving skills and technical depth.
✨Understand the Bigger Picture
While technical skills are crucial, understanding how your work impacts the organisation is key. Be prepared to discuss how your insights can lead to better decision-making and security improvements for the company.
✨Ask Insightful Questions
At the end of the interview, ask questions that show your curiosity about the team’s current projects or challenges they face. This not only demonstrates your interest but also gives you a chance to assess if the role aligns with your career goals.