דרושים » מחשבים ורשתות » linux/ android researcher or developer- 2532

משרות על המפה
 
בדיקת קורות חיים
VIP
הפוך ללקוח VIP
רגע, משהו חסר!
נשאר לך להשלים רק עוד פרט אחד:
 
שירות זה פתוח ללקוחות VIP בלבד
AllJObs VIP
כל החברות >
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
Location: Merkaz
Preforming Android OS at application and platform level.
Researching Android OS mechanisms.
Preforming researcher from forensic point of view.
Develop high level infrastructure (in Python) for end users o access the gained data.
Collaborate with cross-functional teams and partners.
Stay up-to-date with latest trends in the industry.
The job includes built-in training.
Requirements:
BSc in computer science or related fields or relevant work experience.
Experience with high level programing languages (python preferred).
Experience with Linux OS or Android research.
Advantages:
Familiar and knowledge with Android OS application development.
Experience with static and dynamic analysis tools: Frida, Ghidra, JEB, IDA, GDB.
Ability to design and execute technological research.
This position is open to all candidates.
 
Hide
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8611606
סגור
שירות זה פתוח ללקוחות VIP בלבד
משרות דומות שיכולות לעניין אותך
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
14/04/2026
חברה חסויה
Location: Ramat Gan
Job Type: Full Time
we are seeking an experienced Researcher to join our team dedicated to Android malware research. This role presents an exciting opportunity to conduct comprehensive malware analysis, detect emerging threats, and contribute to our understanding of the Android threat landscape. The ideal candidate demonstrates a positive, proactive attitude and excels as a reliable team player with strong technical skills in Android malware analysis. Key Responsibilities:
* Conduct in-depth Android malware research and reverse engineering
* Detect and document emerging Android malware trends and attack vectors
* Analyze Android applications for malicious behavior
* Write detection rules and develop automation processes for Android malware identification
* Collaborate with team members and share knowledge across departments
* Perform static and dynamic analysis of Android malware samples
* Document findings and contribute to threat intelligence reports
About us:
we are a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact-whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, our company provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.
Requirements:
Must-Have:
* At least 3 years of proven experience in one of the following:
* Research in Android /Windows/Mac/ Linux
* Low-level reverse engineering or development
* Proficiency in one or more programming languages: JAVA, Python, JavaScript, or C / C ++
* Experience with reverse engineering tools and decompilers (e.g. JADX, JEB, IDA Pro, Ghidra)
* Familiarity with instrumentation tools like Frida or debugging tools such as GDB/LLDB
* Understanding of networking fundamentals and protocols
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction Nice-to-Have:
* Experience with Android development
* Familiarity with Android frameworks, including Flutter, React Native, or Unity
* Understanding of Android application security
* Familiarity with the Android malware ecosystem and techniques
* Experience in building automated tools
* Experience with writing detailed reports in English
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8516812
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
05/04/2026
חברה חסויה
Location: Petah Tikva
Job Type: Full Time
Required Security Researcher
Position Overview:
Join our Forensic Research Group and take part in uncovering hidden data across mobile applications and cloud ecosystems. The team identifies, analyzes, and extracts forensic artifacts from mobile apps, APIs, cloud services, and raw binary data.
Research areas include protocol analysis, data extraction, file format reverse engineering, and decryption. The team specializes in black-box reverse engineering and advanced mobile analysis across Android and iOS.
You will investigate how mobile applications interact with cloud services and APIs, uncover hidden data flows, and extract forensic artifacts. Your work will include analyzing network traffic, reverse engineering API communication, and understanding data exchange between mobile apps and backend systems. You will conduct research across mobile platforms and cloud environments, reverse engineer protocols and data formats, and develop production-grade code in C# and Python to support large-scale data extraction and analysis, while maintaining internal parsers and research infrastructure.
Requirements:
Computer Science or equivalent degree graduate, or equivalent experience from an IDF tech unit.
Experience researching Android and/or iOS platforms familiarity with Linux internals is a plus.
Experience with low-level reverse engineering
Experience with reverse engineering tools and decompilers (e.g., JADX, JEB, IDA Pro, Ghidra)
Familiarity with instrumentation tools such as Frida - Advantage
Understanding of networking fundamentals and protocols
Proficiency with HTTP debuggers, MITM tools, and network analyzers (e.g., Fiddler, Burp Suite, Wireshark)
Experience analyzing mobile application network communication and APIs
Experience with scripting or automation (Python preferred)
Hands-on experience in object-oriented development, preferably using .NET / C#
Excellent communication skills and the ability to work independently and collaborate effectively with team members
Strong problem-solving skills and attention to detail
Strong self-learning skills and motivation to make an impact
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8600546
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
26/03/2026
חברה חסויה
Location: Herzliya
Job Type: Full Time
PlaxidityX is looking for a brilliant Security Researcher to join our elite team. In this role, you will combine offensive research with product innovation. You will conduct in-depth research and penetration testing on Automotive ECUs , uncovering vulnerabilities at both the hardware and software levels. Additionally, you will act as the 'Red Team' for our vehicle protection systems , simulating sophisticated attacks to ensure our detection capabilities stay ahead of global threats.
?What You’ll Do: ECU & Low-Level Research: Conduct deep-dive security research into Automotive Electronic Control Units (ECUs). Automotive Offensive Research: Analyze automotive protocols and architectures to identify, develop, and implement end-to-end attack vectors. Red Teaming: Serve as the internal adversary for our vehicle protection products. You will execute attacks to validate detection efficacy and provide the offensive 'ground truth' needed to improve our security logic. Collaborate with Data Scientists: Work closely with our Data Science teams to fine-tune AI-based detection features, helping to translate complex exploit behaviors into actionable data features.

Advantages:
Data Science & AI: Experience working with data teams, understanding of feature engineering, or experience fine-tuning AI models based on security domain expertise. OS Internals: High level of expertise in Linux / QNX / Android internals (both user and kernel space). Product Security: Experience building or testing Intrusion Detection/Prevention Systems (IDS/IPS) or EDR/XDR platforms. Automotive Knowledge: Understanding of automotive-specific protocols (CAN, Automotive Ethernet, UDS, etc.) and the ability to implement functional attacks against them.
Requirements:
Offensive Mindset: Proven experience in exposing and exploiting vulnerabilities in complex systems. Embedded Expertise: Hands-on research experience with embedded/low-level systems. Network Communication Expertise: Deep understanding of the logic and vulnerabilities within network protocols and the ability to implement functional attacks against them. Security Fundamentals: Strong grasp of cybersecurity principles, including cryptography. Programming: Strong scripting and development skills in Python (for research/tooling) and C/C++ (for exploit development). Execution: A "get-things-done" attitude; self-driven and thrives in fast-paced, problem-solving environments.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8535362
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/03/2026
Location: Tel Aviv-Yafo
Job Type: Full Time
We are seeking a Senior/Principal Linux Security Researcher for our Tel Aviv R&D center to advance our Cortex-XDR Agent for the Linux platform, which provides runtime protection to servers and cloud workloads. In this role, you will be a key member of a team responsible for researching, developing, and improving our Anti-Exploit and Anti-Malware capabilities. Your work will involve deep exploration of OS internals, exploits, malware, delving into cloud security, and finding ways to mitigate new attack vectors.
Key Responsibilities
Research, develop, and improve state-of-the-art endpoint security solutions focused on comprehensive prevention. This includes broad defense against attack classes like malware and exploits, spanning from low-level mitigations to application-level security
Research Linux OS internals, kernel, application codebases, vulnerabilities, malware and exploits
Respond to security events coming from customers, in the context of malware and exploitation prevention.
Requirements:
In-depth knowledge of some operating system internals is a must - Knowledge of Linux is an advantage
Development experience in C/C++/Rust is a must, 3 years at least
Experience in security research - 3 years at least
Experience in reverse engineering - both static and dynamic, is a must (x86/64 architectures), 3 years at least
Development knowledge in some scripting languages is a must - Experience with Python is an advantage
Ability to work independently and as a part of a team
Strong attention to detail
Ability to take initiative
Preferred Qualifications
Exploitation experience is an advantage (either application-level security or memory corruption)
Familiarity with Kubernetes, containers, and cloud workload security.
Experience leading endpoint security projects across organizational boundaries and teams
Academic experience
Published security research, conference presentations, or CVEs.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8587385
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
22/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Appdome’s mission is to protect every mobile app in the world and the people who use mobile apps in their lives and at work. Appdome provides mobile brands with the only patented, centralized, data-driven Mobile Cyber Defense Automation platform, delivering rapid no-code, no-SDK mobile app security, anti-fraud, anti-malware, anti-cheat, anti-bot implementations, configuration as code ease, Threat-Events™ threat-aware UI/UX control, ThreatScope™ Mobile XDR, and Certified Secure™ DevSecOps Certification in one integrated system. With Appdome, mobile developers, cyber and fraud teams can accelerate delivery, guarantee compliance, and leverage automation to build, test, release, and monitor the full range of cyber, anti-fraud, and other defenses needed in mobile apps from inside mobile DevOps and CI/CD pipeline. Leading financial, healthcare, m-commerce, consumer, and B2B brands use Appdome to upgrade mobile DevSecOps and protect Android & iOS apps, mobile customers, and mobile businesses globally. Today, Appdome's customers use their platform to secure over 50,000+ mobile apps with protection of over 1B mobile end users projected. Job description Appdome is looking for a talented, passionate Offensive Researcher to join our innovative research team. If you’re eager to explore cutting-edge mobile security techniques and help safeguard the mobile app ecosystem, this is the role for you! As a key player in our security team, you'll design and execute sophisticated attack simulations on the Appdome platform. Your work will touch on diverse attack vectors, including file systems, networks, jailbreaks, memory injections, and more.
Requirements:
* 1-3 years of experience in Offensive Security/Cyber.
* Extended knowledge in researching, simulating, and analyzing different application attack vectors.
* Advantage – Experience using a hacking framework or pen-testing tools such as Frida, Magisk, Multiproxy, and Cheat Engine.
* Ability to create analysis plans and execute them, as well as document and troubleshoot errors.
* Ability to understand the system from multiple perspectives, including high-level and low-level technical architecture.
* Experience in Mobile (iOS/Android) analysis environments and automation tools.
* Bachelor’s degree in a relevant field.
* Software development and scripting experience.
Equal Opportunity Employment Appdome is an Equal Opportunity Employer committed to diversity, equity, and inclusion. We evaluate all qualified applicants without discrimination based on race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, veteran status, or other protected characteristics.

This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8529956
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
12/04/2026
חברה חסויה
Location: Herzliya
Job Type: Full Time
Required Security Researcher
As a Security Researcher, you will:
Analyze mobile applications
Perform in-depth technical research on Android and iOS application architectures
Identify forensic artifacts from mobile apps
Analyze both static and runtime behaviors of mobile applications
Develop scripts and tooling to automate process.
Requirements:
Strong knowledge of operating system internals
At least 2 years of experience with advance static and dynamic analysis tools (e.g., Ghidra and Jadx)
Strong ability to analyze and follow application logic in decompiled code (Java/Objective-C)
Basic understanding of ARM64 assembly
Solid understanding of Android and iOS application architecture
Familiarity with app sandboxing, file system layouts, common data storage locations such as SQLite databases/shared Preferences/Plist/Secure storage (Keychain/Keystore/Secure Enclave)
Experience or familiarity with Frida or mobile debuggers
Ability to trace function calls and intercept data at runtime
Strong software development skills in Python
Basic understanding of cryptographic concepts (Android Keystore/iOS Keychain)
Understating of common encryption patterns (symmetric & asymmetric)
Ability to recognize encryption usage within application logic
Ability to write efficient parsers and custom data-extraction logic
It would be great if you also have:
Familiarity with mobile malware analysis or mobile forensics tools
Experience in analyzing obfuscated code (ProGuard, R8 and custom obfuscation)
Experience handling binary or semi-structured data
Background in security research or digital forensics.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8606298
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
09/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Malware Researcher- CTI
The Dream Job
As a Malware Researcher, you will analyze and reverse engineer malware and tooling used by advanced threat actors, particularly those targeting governments and critical infrastructure. You will apply deep expertise in binary and script analysis to uncover capabilities, configurations, and C2 infrastructure for threat actor attribution and mitigations.
Your work will power our malware catalog, strengthen our understanding of threat actors technical capabilities, and directly support the development of next-generation AI-driven "artificial cyber researchers".
The Dream-Maker Responsibilities
Perform in-depth static and dynamic analysis of malware, implants, loaders, and related tooling used by APTs and other sophisticated adversaries.
Reverse engineer binaries and scripts (e.g., PE, ELF, .NET, PowerShell, JavaScript/VBA) to determine capabilities, execution flow, persistence mechanisms, and evasion techniques.
Extract and document configuration data and C2 information, and map these to campaigns, infrastructure, and threat actors in collaboration with CTI researchers.
Develop and maintain detection and hunting artifacts such as YARA rules, VT LiveHunt queries, CAPA rules, and sandbox behavior signatures.
Work closely with CyberAI researchers on the development of next-generation artificial cyber researchers and AI-driven analysis capabilities.
Requirements:
4+ years of experience in cyber security, with significant hands-on experience in malware research focused on APTs and state-linked actors.
Strong proficiency with RE tools such as IDA Pro, Ghidra, x64dbg/WinDbg, and common dynamic analysis/sandbox environments.
Deep understanding of OS internals (Windows/Linux/Android/Mac), common persistence and execution techniques, and modern offensive tradecraft.
Demonstrated experience extracting configs, C2 endpoints, and capabilities from both compiled and scripted malware.
Strong investigative mindset, attention to detail, and ability to work with incomplete or obfuscated data.
Experience researching or defending government or critical infrastructure organizations- Advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8603806
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
31/03/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
We are looking for talented, fast learners to work on vulnerability research and exploitation in embedded and IoT environments. This role is ideal for researchers with strong low-level backgrounds who want to deepen their expertise in IoT and embedded systems security while working on real-world, complex technologies

You will analyze proprietary software and hardware, apply a deep understanding of low-level systems, and take your research from initial discovery to a full end-to-end solution in production.





Requirements
5+ years of experience as a security researcher or industry-equivalent experience.
Understanding of memory corruption (Stack/Heap, UAF) and logical vulnerabilities (Injection, Logic/Design flaws, TOCTOU).
Understanding of common security mitigations such as ASLR, DEP, and CFI.
Expertise in OS internals, file systems, network protocols and cryptography concepts.
Hands-on experience with reverse engineering and debugging tools such as IDA Pro or Ghidra, and GDB.
Proficient in Assembly, C, and Python.
Requirements:
B.Sc. or M.Sc. in Computer Science, Mathematics, or Engineering.
Published research (CVEs, blog posts, or talks).
Experience with RF communication schemes such as WiFi, Bluetooth, GPS
Experience with developing / researching in Android / iOS environments.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8598135
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
09/04/2026
חברה חסויה
Location: Tel Aviv-Yafo
Job Type: Full Time
Required Senior Malware Researcher
The Dream Job
As a Senior Malware Researcher, you will analyze and reverse engineer malware and tooling used by advanced threat actors, particularly those targeting governments and critical infrastructure. You will apply deep expertise in binary and script analysis to uncover capabilities, configurations, and C2 infrastructure for threat actor attribution and mitigations.
Your work will power our malware catalog, strengthen our understanding of threat actors technical capabilities, and directly support the development of next-generation AI-driven "artificial cyber researchers".
The Dream-Maker Responsibilities
Perform in-depth static and dynamic analysis of malware, implants, loaders, and related tooling used by APTs and other sophisticated adversaries.
Reverse engineer binaries and scripts (e.g., PE, ELF, .NET, PowerShell, JavaScript/VBA) to determine capabilities, execution flow, persistence mechanisms, and evasion techniques.
Extract and document configuration data and C2 information, and map these to campaigns, infrastructure, and threat actors in collaboration with CTI researchers.
Develop and maintain detection and hunting artifacts such as YARA rules, VT LiveHunt queries, CAPA rules, and sandbox behavior signatures.
Work closely with CyberAI researchers on the development of next-generation artificial cyber researchers and AI-driven analysis capabilities.
Requirements:
7+ years of experience in cyber security, with significant hands-on experience in malware research focused on APTs and state-linked actors.
Strong proficiency with RE tools such as IDA Pro, Ghidra, x64dbg/WinDbg, and common dynamic analysis/sandbox environments.
Deep understanding of OS internals (Windows/Linux/Android/Mac), common persistence and execution techniques, and modern offensive tradecraft.
Demonstrated experience extracting configs, C2 endpoints, and capabilities from both compiled and scripted malware.
Strong investigative mindset, attention to detail, and ability to work with incomplete or obfuscated data.
Experience researching or defending government or critical infrastructure organizations- Advantage.
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8603734
סגור
שירות זה פתוח ללקוחות VIP בלבד
סגור
דיווח על תוכן לא הולם או מפלה
מה השם שלך?
תיאור
שליחה
סגור
v נשלח
תודה על שיתוף הפעולה
מודים לך שלקחת חלק בשיפור התוכן שלנו :)
2 ימים
Location: Ramat Gan
Job Type: Full Time
Alice is seeking an experienced Malware Research Director to build and manage multiple teams dedicated to malware research. This role presents an exciting opportunity to establish a new operation from the ground up, creating processes, optimizing and setting up cross-team collaboration while serving as the primary client interface. The position is primarily leadership, client-facing, creating solutions and requiring exceptional team-building and operational setup skills. The ideal candidate demonstrates high technical skills, proven experience in building teams from scratch, establishing new operations, and strong client relationship management capabilities. Key Responsibilities:
* Establish operational processes, workflows, and quality standards for the new teams
* Coordinate with other departments to integrate the new operation into the existing infrastructure
* Serve as primary client interface, managing relationships and ensuring client satisfaction
* Present research findings and malicious evidence to clients and stakeholders
* Advise on technical aspects for malware research challenges and automated solutions
* Create training programs and onboarding processes for new team members
* Develop performance metrics and evaluation frameworks for team effectiveness
* Lead client meetings, requirement discussions, and project planning sessions
* Collaborate with sales and business development teams on client engagements

About Alice:
Alice is a trust, safety, and security company built for the AI era. We safeguard the communicative technologies people use to create, collaborate, and interact—whether with each other or with machines. In a world where AI has fundamentally changed the nature of risk, Alice provides end-to-end coverage across the entire AI lifecycle. We support frontier model labs, enterprises, and UGC platforms with a comprehensive suite of solutions: from model hardening evaluations and pre-deployment red-teaming to runtime guardrails and ongoing drift detection.



Hybrid:
No
Requirements:
Must-Have:
* Management experience - managing at least 10 employees for a minimum of 2 years, with extensive experience in recruiting and building teams
* Strong client-facing experience with excellent presentation and communication skills
* At least 3 years of proven experience in one of the following: malware research, reverse engineering, penetration testing, embedded software development
* Understanding of malware research principles and the cybersecurity landscape
* Experience managing client relationships and delivering technical solutions to business stakeholders
* Must have a valid international government-issued photo ID (e.g., current passport, or international driver's license) for identity verification and global client interaction.
* Excellent spoken and written English.
Nice-to-Have:
* Android malware research / reverse engineering hands on experience from the last 3 years
* Experience in leading multiple teams comprising of a few dozen employees
* Experience in leading cybersecurity researchers or other research operations
* Experience establishing new departments or research operations within organizations
* Background in technical sales or business development in cybersecurity
* Experience presenting to C-level executives and technical stakeholders
* Experience with decompilers, debuggers, and disassemblers (e.g., JADX, JEB, LLDB, GDB, x86dbg, Ghidra, IDA Pro)
* Familiarity with instrumentation frameworks like Frida or Xposed
* Proficiency with HTTP debuggers, MITM tools, and network analyzers (e.g., Fiddler, HTTP Toolkit, Burp Suite, Wireshark, Little Snitch, mitmproxy)
* Understanding of network communications and protocols
* Familiarity with multiple programming languages (Java, C/C++, JavaScript, Python)
* Familiarity with multiplatform development frameworks such as Unity, Flutter and React Native
* Under
This position is open to all candidates.
 
Show more...
הגשת מועמדותהגש מועמדות
עדכון קורות החיים לפני שליחה
עדכון קורות החיים לפני שליחה
8375228
סגור
שירות זה פתוח ללקוחות VIP בלבד