3 Exploitdb Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 6.0 years

0 Lacs

hyderabad, telangana

On-site

You will be responsible for analyzing Android malware by performing static and dynamic analysis. This includes reverse-engineering malicious APKs and SDKs to understand their behavior and intent, as well as identifying spyware, trojans, rootkits, and other threats. You will also analyze network traffic and backend systems for vulnerabilities and data leakage. Your findings will need to be documented and presented in reports to both technical and non-technical stakeholders. Additionally, you will participate in client-facing activities and mentor junior analysts. It would be beneficial if you can develop detection signatures such as YARA rules and improve threat detection pipelines and automa...

Posted 1 day ago

AI Match Score
Apply

2.0 - 10.0 years

0 Lacs

bengaluru, karnataka, india

On-site

Dear All, Hiring for Android Malware Analyst for one for our MNC Client Exp: 2-10yrs Work Mode: Hybrid Job Location: Mumbai/Pune/Bangalore/Chennai/Hyderabad/Kolkata/ Noida Skills need: Android Malware, APKS, SDKs, Vulnerability, Reverse Engineering Malware Analysis: Perform static and dynamic analysis of Android malware. Reverse-engineer malicious APKs and SDKs to understand behavior and intent. Identify spyware, trojans, rootkits, and other threats. Analyze network traffic and backend systems for vulnerabilities and data leakage. Document findings and present reports to technical and non-technical stakeholders. Participate in client-facing activities and mentoring junior analysts. Good to h...

Posted 1 month ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

As an Android Malware Analyst, your primary responsibility will be to conduct thorough analysis of Android malware by performing static and dynamic analysis. You will be required to reverse-engineer malicious APKs and SDKs to understand their behavior and intent. Identifying spyware, trojans, rootkits, and other threats will be crucial aspects of your role. Additionally, analyzing network traffic and backend systems for vulnerabilities and potential data leakage will be part of your daily tasks. It will be important for you to document your findings and present detailed reports to both technical and non-technical stakeholders. You will also have the opportunity to participate in client-facin...

Posted 1 month ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies