•Programming: Java, Kotlin, JavaScript, Flutter, other mobile software languages
•Reverse Engineering: Static and dynamic analysis techniques, using tools such as Jadx, Ghidra, Frida, IDA Pro, Burp
•Analyzing, unpacking, and reverse engineering code of malicious applications or SDKs
•ELF (Native Binaries) reverse engineering
•Programming Languages: Strong proficiency in Java and Kotlin; experience with JavaScript, Flutter, and other mobile software languages.
•Reverse Engineering: Experience with analyzing, unpacking, and reverse engineering code of malicious applications or SDKs using tools like Jadx, Ghidra, Frida, IDA Pro, Burp.
•Static and Dynamic Analysis Techniques: Proficient in both static and dynamic analysis methods for identifying malware and other security threats.
•ELF (Native Binaries) Reverse Engineering: Experience with reverse engineering native binaries.
•SQL: Experience developing SQL code to query data and identify common issues in malware analysis.
•Android Fundamentals: Understanding Android activity lifecycles, common Android API usage, AOSP, and Android application development.
•Techniques Used by Malicious Software: Knowledge of various methods used by malware to harm user devices or data.
•Mobile App Store Policies: Familiarity with policies regarding ads, potentially harmful applications (PHAs), and developer guidelines.
•Source Code Analysis: Ability to read, comprehend, and analyze source code.