Description du Poste
Are you driven by uncovering what’s happening beneath the surface of mobile applications? This team builds advanced data and intelligence solutions that help organizations cut through noise, understand complex ecosystems, and make faster, better-informed decisions.
We’re looking for an Android Security Researcher to help establish and grow a mobile intelligence capability within a strong engineering group. This is a hands‑on role for someone who enjoys deep technical work and collaborating closely with engineers and analysts to turn reverse engineering into real, usable insight.
The Role - 100% Remote
In this role, you’ll focus on reverse engineering Android applications to extract meaningful technical and product intelligence. Your work will directly support the development of scalable, reliable data pipelines and intelligence‑driven products.
You’ll Be Responsible For
Reverse engineering major Android applications to uncover strategic and behavioral insights
Using tools such as Frida, JEB, Ghidra, IDA, and internal instrumentation frameworks
Analyzing obfuscation techniques, ARM‑native binaries, and root or jailbreak detection mechanisms
Identifying architectural and functional changes across application versions
Building internal tools and scripts to automate and scale static and dynamic analysis workflows
Working closely with engineering and intelligence teams to translate technical findings into actionable outcomes
All research is conducted strictly within legal and ethical boundaries. This role does not involve hacking or unauthorized access.
Requirements
2+ years of experience in Android reverse engineering, mobile security research, or low‑level mobile development
Strong understanding of Android internals and Java
Practical experience working with Smali and APK structures
Deep familiarity with Frida and runtime manipulation on Android
A curiosity‑driven mindset with an interest in undocumented behaviors and edge cases
Nice to Have
Python scripting for analysis automation
Experience with obfuscation, anti‑analysis techniques, or commercial packers
Previous work with IDA Pro, Radare2, or similar reverse engineering platforms
#J-18808-Ljbffr
Ready to Apply?
Don't miss this opportunity! Apply now and join our team.
Détails du Poste
Date de Publication:
February 24, 2026
Type de Poste:
Informatique & Technologie
Lieu:
Nice, fr
Company:
Snatch UP Jobs
Ready to Apply?
Don't miss this opportunity! Apply now and join our team.