At a Glance
- Tasks: Reverse engineer Android apps to extract valuable insights and support data-driven products.
- Company: Join a cutting-edge team focused on mobile intelligence solutions.
- Benefits: 100% remote work, competitive salary, and opportunities for professional growth.
- Why this job: Dive deep into mobile tech and make impactful contributions to innovative projects.
- Qualifications: 2+ years in Android reverse engineering and strong understanding of mobile security.
- Other info: Collaborative environment with a focus on ethical research and legal boundaries.
The predicted salary is between 36000 - 60000 £ per year.
Are you driven by uncovering what’s happening beneath the surface of mobile applications? This team builds advanced data and intelligence solutions that help organizations cut through noise, understand complex ecosystems, and make faster, better-informed decisions. We’re looking for a Mobile Intelligence Engineer to help establish and grow a mobile intelligence capability within a strong engineering group. This is a hands-on role for someone who enjoys deep technical work and collaborating closely with engineers and analysts to turn reverse engineering into real, usable insight.
In this role, you’ll focus on reverse engineering Android applications to extract meaningful technical and product intelligence. Your work will directly support the development of scalable, reliable data pipelines and intelligence-driven products.
You’ll Be Responsible For:- Reverse engineering major Android applications to uncover strategic and behavioral insights
- Using tools such as Frida, JEB, Ghidra, IDA, and internal instrumentation frameworks
- Analyzing obfuscation techniques, ARM-native binaries, and root or jailbreak detection mechanisms
- Identifying architectural and functional changes across application versions
- Building internal tools and scripts to automate and scale static and dynamic analysis workflows
- Working closely with engineering and intelligence teams to translate technical findings into actionable outcomes
All research is conducted strictly within legal and ethical boundaries. This role does not involve hacking or unauthorized access.
Requirements:- 2+ years of experience in Android reverse engineering, mobile security research, or low-level mobile development
- Strong understanding of Android internals and Java
- Practical experience working with Smali and APK structures
- Deep familiarity with Frida and runtime manipulation on Android
- A curiosity-driven mindset with an interest in undocumented behaviors and edge cases
- Python scripting for analysis automation
- Experience with obfuscation, anti-analysis techniques, or commercial packers
- Previous work with IDA Pro, Radare2, or similar reverse engineering platforms
Mobile Intelligence Engineer in London employer: Snatch UP Jobs
Contact Detail:
Snatch UP Jobs Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Mobile Intelligence Engineer in London
✨Tip Number 1
Get your hands dirty with practical projects! Build a portfolio showcasing your reverse engineering skills on Android apps. This will not only demonstrate your technical prowess but also give you real-world examples to discuss during interviews.
✨Tip Number 2
Network like a pro! Join online communities or forums related to mobile security and reverse engineering. Engaging with others in the field can lead to valuable connections and even job opportunities that aren’t advertised.
✨Tip Number 3
Prepare for technical interviews by practising common reverse engineering challenges. Use platforms like GitHub to find coding problems or create your own scenarios to solve. This will help you feel confident and ready to impress potential employers.
✨Tip Number 4
Don’t forget to apply through our website! We’re always on the lookout for passionate individuals who want to make an impact. Tailor your application to highlight your experience with tools like Frida and Ghidra, and show us how you can contribute to our team.
We think you need these skills to ace Mobile Intelligence Engineer in London
Some tips for your application 🫡
Show Your Passion for Mobile Intelligence: When writing your application, let us see your enthusiasm for mobile applications and reverse engineering. Share any personal projects or experiences that highlight your curiosity and technical skills in this area.
Tailor Your CV and Cover Letter: Make sure to customise your CV and cover letter to reflect the specific requirements of the Mobile Intelligence Engineer role. Highlight your experience with Android internals, tools like Frida, and any relevant projects that demonstrate your expertise.
Be Clear and Concise: We appreciate clarity! Keep your application straightforward and to the point. Use bullet points where possible to make it easy for us to see your qualifications and achievements at a glance.
Apply Through Our Website: Don’t forget to submit your application through our website! It’s the best way for us to receive your details and ensures you’re considered for the role. Plus, it shows you’re serious about joining our team!
How to prepare for a job interview at Snatch UP Jobs
✨Know Your Tools
Familiarise yourself with the tools mentioned in the job description, like Frida, JEB, and Ghidra. Be ready to discuss how you've used these tools in past projects or how you would approach a specific problem using them.
✨Showcase Your Curiosity
This role values a curiosity-driven mindset. Prepare examples of times when your curiosity led you to uncover insights or solve complex problems, especially in reverse engineering or mobile security.
✨Understand Android Internals
Brush up on your knowledge of Android internals and Java. Be prepared to explain how you would analyse obfuscation techniques or handle ARM-native binaries, as this will likely come up during technical discussions.
✨Collaborative Mindset
Since the role involves working closely with engineers and analysts, think of examples that demonstrate your ability to collaborate effectively. Highlight any experiences where teamwork led to successful outcomes in your previous roles.