Corp to corp Hiring || Sr. Android SDK Engineer || Austin, TX


Duration: 6+ months
Location: Austin, TX, San Jose, CA or Bethel, WA
Work Authorization: USC, GC only
Client: Higgins and Associates
 
Must have skills:
 
Job Description
Technical Team Lead for the Android SDK Risk Team:
Leadership Skills:
Experience leading and mentoring teams
Defining technical direction, setting goals, and prioritizing tasks
Ensuring quality service delivery
Transforming client requirements into successful outcomes
Providing thought-leadership and innovative solutions
Technical Skills:
Programming: Java, Kotlin, JavaScript, Flutter, other mobile software languages
Reverse Engineering: Static and dynamic analysis techniques, using tools such as Jadx, Ghidra, Frida, IDA Pro, Burp
Analyzing, unpacking, and reverse engineering code of malicious applications or SDKs
ELF (Native Binaries) reverse engineering
Query languages: SQL
Understanding of:
Android fundamentals: Activity lifecycles, common Android API usage, AOSP
Techniques used by malicious software
Mobile App store policies (Ads, PHAs, Developer)
Reading, comprehending, and analyzing source code
Security engineering and analysis: Network security, cryptography, authentication security, rooting, packing, network protocols, and interception
Additional Skills:
Signature development (e.g., Yara)
Threat research (APT using OSINT, Virus Total, ExploitDB, MITRE)
Vulnerability analysis or security code review
Android software development
Google Ads or content moderation
Capture the Flag (CTF) for mobile software
Pentesting: Blue Team and Red Team experience
Professional Experience and Education:
Preferred: Associates/Bachelor’s/Master’s degree in Computer Science, Computer Engineering, Information Systems, or related discipline
3-5 years of hands-on experience with Android and reverse engineering
Here are the sourcing word strings to find candidates for the Technical Team Lead for the Android SDK Risk Team role:
“Technical Team Lead Android SDK Reverse Engineering”
“Android Developer Lead with Reverse Engineering experience”
“Senior Mobile Security Engineer Java Kotlin”
“Lead Mobile Application Reverse Engineer”
“Senior Android Security Engineer with Malware Analysis”
“Cybersecurity Team Lead specializing in Android SDK
“Malware Analyst Team Lead with Android expertise”
“Mobile Application Penetration Tester”
“Technical Lead for Malware Analysis in Android”
“Mobile Security Engineer specializing in Reverse Engineering”
“Java Kotlin Android Developer with Reverse Engineering”
“Android Reverse Engineering Team Lead”
“Android Malware Analyst with Pen Testing experience”
“Technical Lead for Mobile Security and Reverse Engineering”
“Lead Security Engineer for Android SDK Team”
Skills Required 
Technical Skills:
Programming Languages: Strong proficiency in Java and Kotlin; experience with JavaScript, Flutter, and other mobile software languages.
Reverse Engineering: Experience with analyzing, unpacking, and reverse engineering code of malicious applications or SDKs using tools like Jadx, Ghidra, Frida, IDA Pro, Burp.
Static and Dynamic Analysis Techniques: Proficient in both static and dynamic analysis methods for identifying malware and other security threats.
ELF (Native Binaries) Reverse Engineering: Experience with reverse engineering native binaries.
SQL: Experience developing SQL code to query data and identify common issues in malware analysis.
Android Fundamentals: Understanding Android activity lifecycles, common Android API usage, AOSP, and Android application development.
Techniques Used by Malicious Software: Knowledge of various methods used by malware to harm user devices or data.
Mobile App Store Policies: Familiarity with policies regarding ads, potentially harmful applications (PHAs), and developer guidelines.
Source Code Analysis: Ability to read, comprehend, and analyze source code.
Additional Skills:
Signature Development: Experience with developing signatures, such as Yara.
Threat Research: Research on threats such as Advanced Persistent Threats (APT) using Open-Source Intelligence (Virus Total, Web, ExploitDB, MITRE, etc.).
Security Engineering and Analysis: In-depth knowledge of security topics, including computer and network security, cryptography, authentication security, rooting, packing, and network protocols.
Vulnerability Analysis or Security Code Review: Experience with these areas is beneficial.
Android Software Development: Hands-on experience in Android software development.
Google Ads or Content Moderation: Familiarity with these areas is a plus.
Capture the Flag (CTF) Participation: Participation in CTF competitions for mobile software.
Pen Testing: Experience in pen-testing, with knowledge of Blue Team and/or Red Team methodologies.
Professional Experience and Education:
Required:
3-5 years of hands-on experience with Android and reverse engineering.
Preferred:
Associate, Bachelor’s, or Master’s degree in Computer Science, Computer Engineering, Information Systems, or related discipline.
 
Thanks and Regards!!
Rashmi Kumari ||Technical Recruiter  
Anvik Technologies| Wilmington, DE
 

——————– US STAFFING ESSENTIALS ————————————–
For daily US JOBS / Updated Hotlist / Post hotlist / Vendor Lists from the trusted sources 

For Everything in US Staffing JusSearch on google ” C2C HOTLIST ” for daily 5000+ US JOBS and Updated 10000+ Hotlists.

Have you Checked this No.1 US Staffing Whatsapp Channel for Daily C2C Jobs/ Hotlists and Top US staffing Telegram Channel of 50k American vendors


About Author

JOHN KARY graduated from Princeton University in New Jersey and backed by over a decade, I am Digital marketing manager and voyage content writer with publishing and marketing excellency, I specialize in providing a wide range of writing services. My expertise encompasses creating engaging and informative blog posts and articles.
I am committed to delivering high-quality, impactful content that drives results. Let's work together to bring your content vision to life.

Leave a Reply

Your email address will not be published. Required fields are marked *