Description:
Deep understanding of the Java and Android Framework.Expertise in threat identification and the ability to accurately pinpoint malicious code and classify all categories of Potentially Harmful Applications (PHA).Proficiency with advanced reversing tools (IDA Pro, Ghidra). Ability to reverse-engineer heavily obfuscated code and native libraries.Capable of analyzing and breaking custom cryptographic routines employed by common malware.
Aug 28, 2025;
from:
dice.com