Mobile Reverse Engineer (Android)
Job Details
About the Company
With operational hubs scattered across Europe, Asia, and LATAM, and its headquarters situated in San Francisco, US, the company boasts a workforce of over 1,000 adept professionals. Spanning across more than 20 countries, ALLSTARSIT offers a diverse range of skilled employees across various verticals, including AI, cybersecurity, healthcare, fintech, telecom, media, and so on.
About the Project
We’re looking for a Reverse Engineer to shape the foundation of our mobile intelligence practice and be the first of your kind on the engineering team. This is a unique opportunity to join a fast-growing team and collaborate with an elite group of engineers, analysts, and builders.
Our client is a leading provider of advanced public data API solutions. They streamline complex data collection with secure, real-time, fully managed data flows - delivering accurate, organized data with 99% uptime and minimal engineering effort. We are a bootstrap (profitable & non-funded) company, with 100+ clients and record-breaking ARR in less than 2 years.
Specialization
Headquarters
Years on the market
Team size and structure
Current technology stack
Required skills:
- 2+ years in Android reverse engineering, mobile malware research, or related low-level development roles.
- Strong proficiency in Android internals and Java, with working knowledge of Smali and APK structure.
- Deep understanding of Frida and runtime manipulation techniques on Android.
- A curiosity-driven mindset with a passion for exploring undocumented system behaviors and edge cases.
We’d be lucky if you had:
- Familiarity with Python scripting for analysis automation.
- Experience with anti-analysis evasion, obfuscators, or commercial packers.
- Previous work with IDA Pro, Radare2, or other RE platforms.
Scope of work:
- Reverse engineering major Android applications to extract strategic product intelligence.
- Working with tools such as Frida, JEB, Ghidra, IDA, and custom-built instrumentation frameworks.
- Analyzing obfuscation techniques, ARM-native binaries, and root/jailbreak detection mechanisms.
- Assessing architectural and functional changes across app versions.
- Developing internal tools and scripts to automate and scale static/dynamic analysis workflows.
- Collaborating with engineering and intelligence teams to turn technical findings into actionable insights.
Note: All research is conducted strictly within legal and ethical boundaries. We do not engage in hacking or unauthorized access.