Skip to content

Android Reverse Engineer

  • Hybrid
    • San Jose, California, United States
    • Austin, Texas, United States
    • Seattle, Washington, United States
    +2 more
  • $35 - $65 per hour
  • Information Technology

Android Reverse Engineer role, requires expertise in reverse engineering Kotlin/Java APKs, malware analysis, static/dynamic analysis, Android internals, smali, and tools like JADX, Frida, Ghidra.

Job description

For over half a decade, Hudson Manpower has been a trusted partner in delivering specialized talent and technology solutions across IT, Energy, and Engineering industries worldwide. We work closely with startups, mid-sized firms, and Fortune 500 clients to support their digital transformation journeys. Our teams are empowered to bring fresh ideas, shape innovative solutions, and drive meaningful impact for our clients. If you're looking to grow in an environment where your expertise is valued and your voice matters, then Hudson Manpower is the place for you. Join us and collaborate with forward thinking professionals who are passionate about building the future of work.

Overview

We are seeking a highly skilled Android Reverse Engineer with strong expertise in analyzing Android applications at a code level. This role is not for standard Android developers—we require someone experienced in reverse engineering Kotlin or Java code, ideally to identify malware or other security vulnerabilities within APKs and Android frameworks.

Key Responsibilities

  • Reverse engineer Android applications (APK files) written in Kotlin/Java

  • Analyze obfuscated code to identify malware, vulnerabilities, or other logic issues

  • Decompile, inspect, and understand source-level behavior using tools like JADX, Ghidra, or IDA

  • Conduct static and dynamic analysis of Android apps

  • Provide detailed technical reports outlining findings and recommended mitigations

  • Collaborate with security teams to enhance malware detection and threat intelligence

Nice to Have

  • Prior experience in security engineering, especially in mobile app security

  • Experience writing malware detection signatures or working on threat intel platforms

  • Coding background in Kotlin, Java, Python, or C/C++

  • Knowledge of encryption, obfuscation, and sandboxing techniques used in mobile malware

Job requirements

Required Experience

  • Proven experience reverse engineering Kotlin and/or Java code—either for malware analysis or debugging complex application behavior

  • Hands-on with tools like APKTool, JADX, Frida, Ghidra, Burp Suite, or similar

  • Solid understanding of Android internals and the APK structure

  • Experience with static and dynamic analysis techniques

  • Malware analysis experience specific to Android environments is highly preferred

  • Familiarity with smali code is a plus

or