
Lukket
Slået op
Betales ved levering
About the Role We are seeking a highly skilled Android Security Analyst to conduct a comprehensive security audit of an Android application (APK format). The primary objective is to identify vulnerabilities, hidden backdoors, malicious code, data exfiltration risks, or any security weaknesses that could compromise user data or system integrity. This is a critical role focused on application security, reverse engineering, and malware analysis. Key Responsibilities Perform static and dynamic analysis of the provided APK file Detect: Backdoors or hidden communication channels if any Malicious code or injected payloads Unauthorized data collection or transmission Hardcoded credentials or API keys Suspicious permissions usage Obfuscated or encrypted hidden logic Analyze network calls and backend communication endpoints Evaluate encryption implementation and secure storage practices Identify privilege escalation or root exploitation risks Provide a detailed vulnerability report with: Severity classification (Low / Medium / High / Critical) Technical explanation Exploitation risk Recommended remediation steps Required Skills & Qualifications Strong experience in Android security testing Proficiency in tools such as: JADX / APKTool Frida MobSF Burp Suite Wireshark IDA / Ghidra Knowledge of: Android architecture and permissions model Reverse engineering Malware analysis Network traffic interception Secure coding practices Experience identifying: Data exfiltration patterns C2 (Command & Control) behavior Suspicious background services Dynamic code loading Understanding of OWASP Mobile Top 10 vulnerabilities Deliverables Full security audit report (PDF format) Risk summary for non-technical stakeholders Proof-of-concept (if exploit is possible) Remediation recommendations Good to Have CEH / OSCP / Mobile Security Certification Experience auditing healthcare or data-sensitive applications Experience reviewing closed-source third-party APKs Engagement Type Project-based audit NDA required Strict confidentiality and secure handling of APK file
Projekt-ID: 40232189
3 forslag
Projekt på afstand
Aktiv 21 dage siden
Fastsæt dit budget og din tidsramme
Bliv betalt for dit arbejde
Oprids dit forslag
Det er gratis at skrive sig op og byde på jobs
3 freelancere byder i gennemsnit ₹26.000 INR på dette job

Hi I am Cyber Security and Digital Forensics professional certified with CEH and Digital Forensics with 9 years of industry experience on Web, network and Mobile Application security auditing. I can perform comprehensive security audit of the android application following the security benchmark of OWASP Mobile Top 10, and SANS-25, followed by static and dynamic analysis to find any vulnerabilities within the application architecture. Detailed VAPT report would be provided along with actionable guidelines and evidence of vulnerabilities. Regards Kajal Majhi Cyber Security & Digital Forensics Consultant
₹25.000 INR på 7 dage
2,8
2,8

Most developers check for bugs. I audit for OWASP Mobile Top 10 vulnerabilities. The Security Audit: I will perform a full-spectrum penetration test on your APK, going beyond simple "debugging": Static Analysis (SAST): Using jadx & MobSF to find hardcoded secrets, insecure crypto-providers, and exported activities. Dynamic Analysis (DAST): Using Frida instrumentation to bypass SSL Pinning and inspect live API traffic for data leaks. Malware Forensics: Checking for C2 signatures and unauthorized background services. The Deliverable: You receive a Professional Vulnerability Report (PDF) listing critical issues with Proof-of-Concept (PoC) exploits and remediation steps. Why Higher Price?: Real security takes time. I don't use automated scanners only; I manually verify every false positive. Price: ₹32,500 INR (Premium Deep Dive). Time: 5 Days (Allows for deep manual review).
₹35.000 INR på 5 dage
0,0
0,0

Security audits fail when they jump to conclusions instead of validating execution paths and real data movement under runtime conditions. I will conduct structured static and dynamic analysis to detect backdoors, hidden payloads, data exfiltration vectors, hardcoded secrets, and suspicious permission abuse. Runtime instrumentation and network interception will validate actual behavior, not assumptions. You will receive a concise, severity ranked report with exploitation risk and remediation guidance. Once I deliver the first audit version, we can iterate based on findings and deepen the investigation where it matters most.
₹18.000 INR på 4 dage
0,0
0,0

Bengaluru, India
Medlem siden maj 15, 2025
₹100-400 INR / time
₹600-1500 INR
₹1500-12500 INR
₹12500-37500 INR
₹12500-37500 INR
$30-250 USD
$750-1500 USD
₹1500-12500 INR
$250-750 USD
$10-30 USD
$1500-2000 USD
€750-1500 EUR
$250-750 CAD
£750-1500 GBP
₹12500-37500 INR
$30-60 USD
₹12500-37500 INR
$250-750 USD
₹100-400 INR / time
₹12500-37500 INR
$250-750 USD
$250-750 USD
$2-8 USD / time
$750-1500 AUD
$30-250 USD