[Hiring] Android Reverse Engineer @AI2CYBER
Android Reverse Engineer @AI2CYBER
Software Development
Salary unspecified
Remote Location
Employment Type full-time
Posted 2d ago

[Hiring] Android Reverse Engineer @AI2CYBER

2d ago - AI2CYBER is hiring a remote Android Reverse Engineer. 💸 Salary: unspecified 📍Location: Greece

Role Description

We are hunting for a world-class Android Reverse Engineer based in Greece, who speaks bytecode fluently, thinks in opcodes, and lives to dismantle and harden Android applications. You’ll be deep in APK guts, weaponizing Frida, Ghidra, and friends, turning shady behaviors into actionable intel - and turning your knowledge into hardened, unbreakable apps.

What You'll Do:

  • Tear apart APKs and native libs to find vulnerabilities, logic bombs, and covert payloads.
  • Use tools like Frida, Ghidra, IDA Pro, and JADX to expose hidden internals and bad practices.
  • Break obfuscation, fingerprint malware, and reverse custom protocols.
  • Analyze both Java/Kotlin and native (C/C++) code—static and runtime.
  • Design anti-tamper and anti-reversing layers that slow down the next you.
  • Guide dev teams like a ghost in the machine—building secure-by-default code.
  • Stay ahead of Android threat actors. If it’s zero-day, you already saw it coming.
  • Drop reports that read like threat actor confessionals—because you know how they think.

Qualifications

  • 5+ years doing deep Android RE, mobile app hacking, or security research (or a Master’s with serious project chops).
  • Mastery of Android internals—ART/Dalvik, Zygote, Binder, the works.
  • Fluency with Frida, Ghidra, APKTool, Dex2Jar, Magisk modules, Xposed—whatever works.
  • Solid coding skills in Java/Kotlin and native C/C++ (ARM assembly a big plus).
  • Familiarity with obfuscation frameworks (DexGuard, ProGuard) and how to beat them.
  • Strong instinct for threat modeling, exploit chains, and mobile malware ops.
  • Understanding of OWASP Mobile Top 10—but you’ve probably written a better list.

Bonus Points If You

  • Have dropped 0-days or built open-source tools.
  • Know how malware hides, mutates, persists.
  • Hold OSCP, OSCE, or any badge earned the hard way.
  • Have presented at DEF CON, Black Hat, or dropped blogs that made people sweat.

Benefits

  • Remote-first culture. Hacker hours. We don’t care where you work—as long as you deliver.
  • Competitive compensation + performance-based bonuses.
  • Training budget—go break new tools or build them.
  • A chance to build the tools you wish existed.
  • A team that gets it.

Ready to Join?

Send your resume, war stories (or GitHub), and anything that proves you're the real deal to [email protected] .

Note: All applications will be treated with strict confidentiality.

This position is available only for Greek residents.

Before You Apply
remote Be aware of the location restriction for this remote position: Greece
Beware of scams! When applying for jobs, you should NEVER have to pay anything. Learn more.
Android Reverse Engineer @AI2CYBER
Software Development
Salary unspecified
Remote Location
Employment Type full-time
Posted 2d ago
Apply for this position
Did not apply
Applied
Sent Follow-Up
Interview Scheduled
Interview Completed
Offer Accepted
Offer Declined
Unlock 155,000+ Remote Jobs
remote Be aware of the location restriction for this remote position: Greece
Beware of scams! When applying for jobs, you should NEVER have to pay anything. Learn more.
Apply for this position
Did not apply
Applied
Sent Follow-Up
Interview Scheduled
Interview Completed
Offer Accepted
Offer Declined
Unlock 155,000+ Remote Jobs
×

Apply to the best remote jobs
before everyone else

Access 155,000+ vetted remote jobs and get daily alerts.

4.9 ★★★★★ from 500+ reviews
Unlock All Jobs Now

Maybe later