
Android Reverse Engineer
- Hybrid
- San Jose, California, United States
- Austin, Texas, United States
- Seattle, Washington, United States
+2 more- $35 - $65 per hour
- Information Technology
Android Reverse Engineer role, requires expertise in reverse engineering Kotlin/Java APKs, malware analysis, static/dynamic analysis, Android internals, smali, and tools like JADX, Frida, Ghidra.
Job description
For over half a decade, Hudson Manpower has been a trusted partner in delivering specialized talent and technology solutions across IT, Energy, and Engineering industries worldwide. We work closely with startups, mid-sized firms, and Fortune 500 clients to support their digital transformation journeys. Our teams are empowered to bring fresh ideas, shape innovative solutions, and drive meaningful impact for our clients. If you're looking to grow in an environment where your expertise is valued and your voice matters, then Hudson Manpower is the place for you. Join us and collaborate with forward thinking professionals who are passionate about building the future of work.
Overview
We are seeking a highly skilled Android Reverse Engineer with strong expertise in analyzing Android applications at a code level. This role is not for standard Android developers—we require someone experienced in reverse engineering Kotlin or Java code, ideally to identify malware or other security vulnerabilities within APKs and Android frameworks.
Key Responsibilities
Reverse engineer Android applications (APK files) written in Kotlin/Java
Analyze obfuscated code to identify malware, vulnerabilities, or other logic issues
Decompile, inspect, and understand source-level behavior using tools like JADX, Ghidra, or IDA
Conduct static and dynamic analysis of Android apps
Provide detailed technical reports outlining findings and recommended mitigations
Collaborate with security teams to enhance malware detection and threat intelligence
Nice to Have
Prior experience in security engineering, especially in mobile app security
Experience writing malware detection signatures or working on threat intel platforms
Coding background in Kotlin, Java, Python, or C/C++
Knowledge of encryption, obfuscation, and sandboxing techniques used in mobile malware
Job requirements
Required Experience
Proven experience reverse engineering Kotlin and/or Java code—either for malware analysis or debugging complex application behavior
Hands-on with tools like APKTool, JADX, Frida, Ghidra, Burp Suite, or similar
Solid understanding of Android internals and the APK structure
Experience with static and dynamic analysis techniques
Malware analysis experience specific to Android environments is highly preferred
Familiarity with smali code is a plus
or
All done!
Your application has been successfully submitted!