Contact Details:
1. Yashodatta Deshpande
Email:
Cell:
2. Harika Mamidala
Email:
Cell:
Job Title: Malware Analyst - Android
Location: Mountain View CA
Duration: 12 Months
Years of Experience: 3 Years
Required Hours/Week: 40 Hours/Week
Notes:
- Locals Preferred but relocation is also okay if candidate cover expenses
- Need some exp with Reverse Engineering (Ghidra IDA PRO Jadex) along with Android Malware analysis.
Duties and Responsibilities:
- Reverse engineer Android apps malwares and SDKs to identify threat behaviors and attack patterns.
- Perform static and dynamic analysis of APKs binaries and mobile executables
- Analyze different types/families of malwares such as viruses worms trojans and ransomware to understand their functionality origin and potential impact.
- Document investigation findings and prepare clear actionable reports.
- Develop framework/custom scripts and tools to automate the malware analysis process.
- Use industry standard tools such JADx Ghidra Frida IDA Pro and Burp Suite
- Supporting testing different project involving malware detection prevention test detection accuracy and find out gaps in detection engine.
- Stay updated with the latest cybersecurity trends threats and vulnerabilities.
Required Skills and Experience:
- 3 years of proven work experience in malware analysis and research
- Strong knowledge of malware operation and indicators of compromise.
- Good understanding of tools like Metasploit cobalt strike etc.
- Experience with reverse engineering tools (such as IDA Pro OllyDbg or Ghidra).
- Proficient in scripting languages (such as Python Bash).
- Experience with Android OS architecture and application structure is preferred (APK format permissions model services activities).
- Preferred experience with sandbox environment to executing malware.
Contact Details: 1. Yashodatta Deshpande Email: Cell: 2. Harika Mamidala Email: Cell: Job Title: Malware Analyst - Android Location: Mountain View CA Duration: 12 Months Years of Experience: 3 Years Required Hours/Week: 40 Hours/Week Notes: Locals Preferred but relocation is also ok...
Contact Details:
1. Yashodatta Deshpande
Email:
Cell:
2. Harika Mamidala
Email:
Cell:
Job Title: Malware Analyst - Android
Location: Mountain View CA
Duration: 12 Months
Years of Experience: 3 Years
Required Hours/Week: 40 Hours/Week
Notes:
- Locals Preferred but relocation is also okay if candidate cover expenses
- Need some exp with Reverse Engineering (Ghidra IDA PRO Jadex) along with Android Malware analysis.
Duties and Responsibilities:
- Reverse engineer Android apps malwares and SDKs to identify threat behaviors and attack patterns.
- Perform static and dynamic analysis of APKs binaries and mobile executables
- Analyze different types/families of malwares such as viruses worms trojans and ransomware to understand their functionality origin and potential impact.
- Document investigation findings and prepare clear actionable reports.
- Develop framework/custom scripts and tools to automate the malware analysis process.
- Use industry standard tools such JADx Ghidra Frida IDA Pro and Burp Suite
- Supporting testing different project involving malware detection prevention test detection accuracy and find out gaps in detection engine.
- Stay updated with the latest cybersecurity trends threats and vulnerabilities.
Required Skills and Experience:
- 3 years of proven work experience in malware analysis and research
- Strong knowledge of malware operation and indicators of compromise.
- Good understanding of tools like Metasploit cobalt strike etc.
- Experience with reverse engineering tools (such as IDA Pro OllyDbg or Ghidra).
- Proficient in scripting languages (such as Python Bash).
- Experience with Android OS architecture and application structure is preferred (APK format permissions model services activities).
- Preferred experience with sandbox environment to executing malware.
View more
View less