Threat Analyst (Mobile Malware)
Role details
Job location
Tech stack
Job description
As a Threat Analyst diving into the world of Mobile Malware at ThreatFabric, you will analyze malicious code targeting mobile platforms, uncover threat actor techniques, and transform complex technical findings into clear, actionable intelligence for customers and internal stakeholders. You will play a critical role in uncovering the latest mobile threats, predicting shifts in the threat landscape, and enhancing our detection capabilities. You will work closely with internal security, engineering, and intelligence teams to ensure stakeholders stay informed and protected against emerging mobile threats.
Responsibilities Your key responsibilities will include:
- Performing in-depth reverse engineering of Android and iOS malware using tools such as JEB, Ghidra, JADX, Frida, and dynamic analysis frameworks.
- Conducting static and dynamic malware analysis to uncover functionality, behavior, and indicators of compromise (IOCs).
- Collecting, correlating, and analyzing threat intelligence from open-source, proprietary, and internal data sources.
- Identifying and tracking mobile threat actors, campaigns, and emerging malware families.
- Performing proactive threat hunting to uncover new, unknown, and evolving mobile threats.
- Conducting investigations based on customer requests and delivering clear, actionable results to support their anti-fraud strategies.
- Producing high-quality reports, including detailed technical analyses, threat summaries, and customer-facing deliverables.
- Communicating findings clearly to technical and non-technical audiences, including customers, leadership, and cross-functional teams.
- Collaborating with internal teams to improve visibility on the threat landscape and enhance detection capabilities.
- Staying up to date with developments in mobile malware, cybercrime trends, and attacker Modus Operandi., * Adheres to company security, continuity, and privacy standards.
- Acts as a role model in secure research practices and data compliance.
- Proactively reports and supports resolution of security incidents.
Requirements
Technical Skills
- Proven experience in reverse engineering mobile applications, especially mobile malware.
- Experience with industry-standard reverse engineering tools such as JEB, Ghidra, JADX, Frida, and dynamic analysis frameworks.
- Basic proficiency in scripting languages such as Python and Bash for automation, data parsing, and analysis tooling.
Would be a bonus:
- Strong knowledge of Android and/or iOS internals, mobile security models, and common mobile attack vectors.
- Strong knowledge of the current mobile threat landscape, including malware families, threat actors, and emerging Modus Operandi.
Analytical Skills
- Ability to identify patterns in complex datasets and threat intelligence.
- Experience working with tools such as Kibana and Elasticsearch.
- Ability to correlate code, attack techniques, campaigns, and Modus Operandi into a coherent intelligence picture.
Communication and Reporting
- Strong writing and verbal communication skills.
- Ability to clearly communicate complex technical findings to both technical and non-technical stakeholders.
Continuous Learning
- Strong eagerness to stay up to date with the latest developments in the mobile threat landscape.
- Continuous drive to improve technical and analytical skills.
Benefits & conditions
- A 12-month employment contract with the intention to extend. Subject to mutual satisfaction, this may lead to a permanent position.
- A competitive salary 70k - 90k annualy
- 25 holidays per year.
- 8% holiday allowance (included in annual salary).
- A Pension Scheme
- A stimulating and supportive work environment that encourages growth and development.
- The opportunity to make a meaningful impact in a rapidly growing tech company.
- Flexible Remote / Hybrid work-from-home options to promote work-life balance.
- Flexible working hours.
- Active ThreatFabric events and FitFabric bootcamps.
- Active knowledge-sharing huddles.