At a Glance
- Tasks: Reverse engineer Android apps to uncover hidden threats and analyse potential malware.
- Company: Join a leading global tech client known for its elite malware analysis team.
- Benefits: Enjoy a competitive day rate, hybrid work options, and potential contract extensions.
- Why this job: Dive deep into forensic work and make a real impact in cybersecurity.
- Qualifications: Strong experience in Android malware analysis and reverse engineering required.
- Other info: Flexible day rate for the right candidate; UK applicants only.
The predicted salary is between 45000 - 75000 £ per year.
Malware Analyst / Pen Tester – Android | £625–£650 p/d | Outside IR35 | Hybrid – London | 6 Months
SR2 are supporting a major global tech client in the expansion of their elite malware analysis team.
They’re hiring two Malware Analysts with deep Android security expertise to uncover malicious behaviours, reverse engineer complex APKs, and assess real-world risks at scale. This isn’t about bug hunting, this is deep forensic work to detect intentionally hidden threats.
The Role:
- Reverse engineering Android apps to detect hidden malicious behaviour
- Analysing potential threats: malware, premium call triggers, surveillance capabilities
- Supporting automated detection with human-led scrutiny and investigation
Must-Have:
- Strong hands-on experience in Android malware analysis
- Background in reverse engineering APKs and obfuscated code
- Security-first mindset with the ability to think like an attacker
Nice to Have:
- Experience at large antivirus/security firms or on high-scale malware analysis projects
- Exposure to large app store environments or critical infrastructure vetting
Details:
- Day Rate: £625–£650 p/d (flexible for the right profile)
- IR35: Outside
- Contract Length: 6 months (likely extension)
- Location: Hybrid – London (UK only)
- Interview Process: Single-stage
#J-18808-Ljbffr
Penetration Tester employer: SR2 REC LTD
Contact Detail:
SR2 REC LTD Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Penetration Tester
✨Tip Number 1
Network with professionals in the cybersecurity field, especially those who specialise in Android security. Attend relevant meetups or webinars to connect with potential colleagues and learn about the latest trends in malware analysis.
✨Tip Number 2
Showcase your skills through personal projects or contributions to open-source initiatives related to Android malware analysis. This not only demonstrates your expertise but also gives you practical experience that can impress potential employers.
✨Tip Number 3
Prepare for the interview by brushing up on common reverse engineering techniques and tools used in Android malware analysis. Being able to discuss these confidently will show your depth of knowledge and readiness for the role.
✨Tip Number 4
Research our company culture and values at StudySmarter. Tailoring your conversation during the interview to align with our mission can help you stand out as a candidate who is not only qualified but also a good fit for our team.
We think you need these skills to ace Penetration Tester
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights your experience in Android malware analysis and reverse engineering. Use specific examples of projects where you've uncovered malicious behaviours or worked with obfuscated code.
Craft a Strong Cover Letter: In your cover letter, emphasise your security-first mindset and ability to think like an attacker. Mention any relevant experience at antivirus firms or large-scale malware analysis projects to stand out.
Showcase Relevant Skills: Clearly list your technical skills related to malware analysis and reverse engineering in both your CV and cover letter. Include tools and methodologies you are proficient in, as this will demonstrate your expertise.
Prepare for the Interview: Research common interview questions for penetration testers and malware analysts. Be ready to discuss your previous work in detail, especially any forensic investigations you've conducted on Android apps.
How to prepare for a job interview at SR2 REC LTD
✨Showcase Your Technical Skills
Be prepared to discuss your hands-on experience with Android malware analysis. Highlight specific projects where you reverse-engineered APKs or dealt with obfuscated code, as this will demonstrate your expertise in the field.
✨Think Like an Attacker
During the interview, emphasise your security-first mindset. Share examples of how you've approached problems from an attacker's perspective, which is crucial for a role focused on uncovering hidden threats.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your analytical skills and decision-making process. Practice articulating your thought process when faced with potential threats, as this will showcase your ability to handle real-world risks.
✨Research the Company and Its Projects
Familiarise yourself with the company's work in malware analysis and any recent projects they've undertaken. This knowledge will not only help you tailor your responses but also show your genuine interest in the role and the organisation.