
Search by job, company or skills
Working Hours: 9:00 AM - 12:00 PM, 1:30 PM - 7:00 PM
Working Day: Monday - Saturday
Work Mode: WFH & Onsite
Key Responsibilities
Perform Android reverse engineering, including decompilation, unpacking, and cracking of applications
Analyze and research protected applications, including VMP (Virtual Machine Protection) and other reinforcement or obfuscation solutions
Conduct static and dynamic analysis to understand application behavior and protection mechanisms
Track, research, and stay up to date with the latest industry practices and reverse engineering techniques
Experience in de-obfuscation, unpacking, and protection removal
Experience researching or working with Android system source code
Experience with payment-related or financial applications is an advantage
Strong expertise in Android app reverse engineering, including Smali and native (.so) assembly analysis
Proficient in common APK reverse engineering tools and static analysis methodologies
Solid understanding of Android build, signing, and packaging processes
Familiar with the principles of hooking techniques and experienced with common hook frameworks
Hands-on experience with DEX dynamic debugging native-layer hooking experience is required
Responsible, detail-oriented, with good communication skills and ability to work effectively in a team
Interested applicants, please click on Apply Now or email to submit your resume.
We regret to inform that only shortlisted candidates will be notified.
Stafflink Services Pte Ltd
EA Licence No.: 04C4294
EA Personnel: Chew Hong Huang
EA Personnel Reg. No.: R24124128
Job ID: 138894019