Android Malware Analyst

FocusKPI Inc.Mountain View, CA
3d$60 - $71Onsite

About The Position

FocusKPI is seeking an Android Malware Analyst to join one of our clients, a high-tech SaaS company. Work Location: Mountain View, CA Duration: 12-month contract with potential to extend; On-site role (5 days a week onsite) Pay Range: $60/hr - 71/hr No C2C resumes are considered

Requirements

  • 3+ years of proven work experience in malware analysis and research
  • Education requirement (Minimum): Associate's Degree (Community College, MBO); College degree
  • Strong knowledge of malware operation and indicators of compromise.
  • Good understanding of tools such as Metasploit and Cobalt Strike.
  • Experience with reverse engineering tools (such as IDA Pro, OllyDbg, or Ghidra).
  • Proficient in scripting languages (such as Python, Bash).
  • Experience with Android OS architecture and application structure is preferred (APK format, permissions model, services, activities).
  • Preferred experience with a sandbox environment for executing malware.
  • Good communication skills.

Nice To Haves

  • Customer-centric: Anybody you interact with can be considered a customer.
  • Deep-diver: Curious about everything and insists on understanding the big picture.
  • Quality advocate: Maintain high standards when it comes to product quality.
  • Innovator: Constantly on the lookout for improving what we do.
  • Proactive: self-starter with a keen eye for details, with focus on end-user experiences and ability to go above and beyond to ensure a high-quality release in a fast-paced and changing environment

Responsibilities

  • Reverse engineer Android apps, malwares and SDKs to identify threat behaviors and attack patterns.
  • Perform static and dynamic analysis of APKs, binaries, and mobile executables
  • Analyze different types/families of malware, such as viruses, worms, trojans, and ransomware, to understand their functionality, origins, and potential impacts.
  • Document investigation, findings and prepare clear, actionable reports.
  • Develop framework/custom scripts and tools to automate the malware analysis process.
  • Use industry standard tools such as JADx, Ghidra, Frida, IDA Pro, and Burp Suite
  • Supporting testing different projects involving malware detection, prevention, testing detection accuracy, and finding gaps in the detection engine.
  • Stay updated with the latest cybersecurity trends, threats, and vulnerabilities.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service