Job Specifications
About the Company
We are seeking a skilled Malware Analyst with strong experience in Android reverse engineering and threat research. This role is responsible for analyzing malicious software, identifying attack patterns, and contributing to the development of detection and prevention capabilities. The ideal candidate has hands-on experience with reverse engineering tools, malware families, and automation frameworks.
About the Role
This role is responsible for analyzing malicious software, identifying attack patterns, and contributing to the development of detection and prevention capabilities.
Responsibilities
Reverse engineer Android applications, malware, and SDKs to identify threat behaviors and attack patterns.
Perform static and dynamic analysis of APKs, binaries, and mobile executables.
Analyze various malware families (e.g., viruses, worms, trojans, ransomware) to understand functionality, origin, and potential impact.
Document investigations, findings, and produce clear, actionable technical reports.
Develop frameworks, custom scripts, and tools to automate malware analysis processes.
Utilize industry-standard tools such as JADx, Ghidra, Frida, IDA Pro, and Burp Suite.
Support testing initiatives related to malware detection and prevention, including validating detection accuracy and identifying gaps in detection engines.
Stay current with emerging cybersecurity threats, vulnerabilities, and industry trends.
Qualifications
Bachelor’s degree or equivalent practical experience.
Required Skills
3+ years of experience in malware analysis and research.
Strong understanding of malware operations and indicators of compromise (IOCs).
Experience with offensive security tools such as Metasploit and Cobalt Strike.
Hands-on experience with reverse engineering tools (e.g., IDA Pro, OllyDbg, Ghidra).
Proficiency in scripting languages such as Python and Bash.
Solid understanding of Android OS architecture and application structure (APK format, permissions model, services, activities).
Experience working within sandbox environments to safely execute and analyze malware.
Strong written and verbal communication skills.
Preferred Skills
Experience building automation frameworks for malware analysis workflows.
Familiarity with mobile security testing methodologies.
Experience contributing to detection engine improvements or security product development.
Pay range and compensation package
Duration: 12+ Months
Equal Employment Opportunity
Trilyon is an Equal Opportunity Employer, committed to fairness and respect for all individuals. We value diversity in age, disability, ethnicity, gender, gender identity, religion, and sexual orientation, believing it drives innovation and better service. Employment decisions are made impartially, without regard to any protected characteristic under federal, state, or local law. Our diverse team drives innovation, competitiveness, and creativity, enhancing our ability to effectively serve our clients and communities. This commitment to diversity makes us stronger and more adaptable.
About the Company
Trilyon, Inc. is a trusted partner to some of the world's leading organizations, including Fortune 500 companies, helping them solve complex business challenges through customized workforce and consulting solutions. With a strong presence across North America, LATAM, EMEA, and APAC, Trilyon brings a global perspective combined with deep local insights to every engagement. We offer a wide range of services spanning project-based consulting, managed workforce solutions, staff augmentation, direct sourcing, and end-to-end progr...
Know more