Malware Analyst (Android Platform)

FocusKPI Inc.Mountain View, CA
3d$60 - $71Onsite

About The Position

FocusKPI is seeking an Malware Analyst (Android Platform) to join one of our clients, a high-tech SaaS company. Work Location: Mountain View, CA Duration: 12-month contract with potential to extend; On-site role (5 days a week onsite) Pay Range: $60/hr - 71/hr No C2C resumes are considered

Requirements

  • 3+ years of proven work experience in malware analysis and research
  • Education requirement (Minimum): Associate's Degree (Community College, MBO); College degree
  • Strong knowledge of malware operation and indicators of compromise.
  • Good understanding of tools such as Metasploit and Cobalt Strike.
  • Experience with reverse engineering tools (such as IDA Pro, OllyDbg, or Ghidra).
  • Proficient in scripting languages (such as Python, Bash).
  • Experience with Android OS architecture and application structure is preferred (APK format, permissions model, services, activities).
  • Preferred experience with a sandbox environment for executing malware.
  • Good communication skills.

Nice To Haves

  • Customer-centric: Anybody you interact with can be considered a customer.
  • Deep-diver: Curious about everything and insists on understanding the big picture.
  • Quality advocate: Maintain high standards when it comes to product quality.
  • Innovator: Constantly on the lookout for improving what we do.
  • Proactive: self-starter with a keen eye for details, with focus on end-user experiences and ability to go above and beyond to ensure a high-quality release in a fast-paced and changing environment

Responsibilities

  • Reverse engineer Android apps, malwares and SDKs to identify threat behaviors and attack patterns.
  • Perform static and dynamic analysis of APKs, binaries, and mobile executables
  • Analyze different types/families of malware, such as viruses, worms, trojans, and ransomware, to understand their functionality, origins, and potential impacts.
  • Document investigation, findings and prepare clear, actionable reports.
  • Develop framework/custom scripts and tools to automate the malware analysis process.
  • Use industry standard tools such as JADx, Ghidra, Frida, IDA Pro, and Burp Suite
  • Supporting testing different projects involving malware detection, prevention, testing detection accuracy, and finding gaps in the detection engine.
  • Stay updated with the latest cybersecurity trends, threats, and vulnerabilities.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Career Level

Mid Level

Education Level

Associate degree

Number of Employees

1-10 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service