National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Android Security Software Developer, Fraud (Remote)

bet365
Leeds
1 week ago
Applications closed

Related Jobs

View all jobs

Cybersecurity Project Manager

Cybersecurity Project Manager

Cybersecurity Project Manager

Malware Analyst - Android (London)

Mid-Level Penetration tester

Mid-Level Penetration tester

Who we are looking for

An Android Security Software Developer, who will safeguard the Business by uncovering exploits, architecting robust defences, and collaborating with teams to thwart sophisticated reverse engineers.


Within the fraud site defence team, you will be a key defender at the forefront of our security battle on our Android platform.


You will face sophisticated hackers by uncovering and analysing exploits, vulnerabilities and cheat mechanisms. In response, you will design and implement cutting-edge anti-tamper and anti-cheat systems across our Android native app and companion apps, to ensure robust GPS data integrity, innovative client hardening and anti-automation techniques.


This role will challenge you to leverage your Android platform knowledge, reverse engineering and mobile security expertise to keep the Business one step ahead in today’s dynamic threat landscape.


Preferred skills and experience

  • Experience in Android security, mobile threat modelling and developing anti-cheat measures.
  • Proficient in low-level systems programming, operating system internals and reverse engineering, with additional knowledge of ARM assembly is advantageous.
  • Skilled in C++ for native development, with working knowledge of Kotlin for secure, high-performance mobile applications.
  • Clear interest in architecting and implementing advanced security features, anti-tamper and robust defence mechanisms.
  • Experience in Android development.
  • Strong knowledge of cryptography and an understanding of encryption algorithms, hashing and secure key management practices.
  • Passionate about uncovering vulnerabilities and staying ahead of potential attackers.
  • Proven ability to work effectively with cross-functional teams to translate complex security challenges into actionable solutions.
  • Exceptional attention to detail paired with a forward-thinking approach to enhancing security measures.


Main Responsibilities

  • Identifying, analysing, and reverse engineering exploits, vulnerabilities, and cheat mechanisms to devise effective countermeasures.
  • Designing and implementing advanced anti-tamper and anti-cheat systems across the native app and companion apps.
  • Implementing measures that guarantee GPS data in native apps remains unspoofed and untampered.
  • Pioneering new methods from memory protection to code obfuscation, to pre-empt and mitigate potential exploits.
  • Designing and implementing robust detection and prevention systems to identify and block unauthorised automation, including bots, macros, and scripting tools, whilst preserving the integrity of user interactions.
  • Analysing emerging threats and hacker behaviour, to refine and adapt security strategies.
  • Providing mentorship and knowledge sharing to junior developers, fostering a proactive security culture.
  • Creating and maintaining tools and scripts for real-time detection and response to suspicious activities.


“By applying to us you are agreeing to share your Personal Data in accordance with our Recruitment Privacy Policy - http://www.bet365careers.com/privacypolicy.pdf"

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.