Mobile Security R&D | Remote-first
Oversecured builds award-winning scanners that find vulnerabilities in Android and iOS apps before they reach production. Security teams at Google, TikTok, Expedia, Mercado Libre and dozens more enterprises rely on our research, ranked #1 in Mobile Security by Google Play Security Program and Samsung.
Millions of developers are now shipping AI-generated code without deep security expertise and/or basic knowledge of mobile security. We are fixing that — every app scanned with Oversecured is over-secured and ready for release.
Interview with the Founder
Android App Bug Bounty Secrets
TechCrunch about Oversecured
Mobile security startup Oversecured launches after self-funding $1 million, thanks to bug bounty payouts
Role Overview
We’re expanding our core security team with a Mobile App Security Expert who will rotate between research, product engineering and direct customer collaboration.
The position is open to both experienced researchers and strong junior engineers motivated to become world-class in mobile security. Compensation will be tailored to your level and interview results.
What You’ll Do
- Research Android and iOS internals; design and implement new static and dynamic rules for our scanners.
- Act as the technical voice in customer calls: explain scan reports, suggest secure architecture and coding practices.
- Hunt for vulnerabilities in third-party apps, report them responsibly, and co-author public write-ups (e.g., our past Samsung, Xiaomi and TikTok disclosures).
- Collaborate with product & engineering to turn research insights into features that delight developers.
What You Bring
For senior candidates
- 3+ years in mobile security research, reverse engineering or mobile exploit development.
- Deep knowledge of Kotlin/Java and/or Swift/Objective-C internals.
- Experience presenting findings to both engineers and executives; published CVEs or conference talks are a plus.
For rising talent
- Solid programming skills (any language) and at least hobby-level reverse engineering/CTF experience on Android/iOS.
- Genuine curiosity for how things break and the persistence to trace bugs to first principles.