XX
Hardware Security and Vulnerability Analyst - RemoteDelphi TechnologiesUnited States
XX

Hardware Security and Vulnerability Analyst - Remote

Delphi Technologies
  • US
    United States
  • US
    United States

À propos

Hardware Security and Vulnerability Analyst - Remote EOE Statement We are an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status or any other characteristic protected by law.
EndoSec LLC, Remote. Preferred Skills: C/C++, Python, assembly, IDA Pro, Ghidra, FPGA, cryptography, hardware, embedded software, hardware security, reverse engineering, side channel attacks, fault injection. Travel required up to 20%.
Must be able to apply for and maintain a U.S. Government Security Clearance.
The EndoSec Hardware Security and Vulnerability Analyst is responsible for extracting and analyzing firmware and data at rest, identifying vulnerabilities in software, firmware, and hardware, and developing proof‑of‑concept exploits. The candidate will collaborate with other engineers and security experts to find and exploit security flaws and vulnerabilities within devices and designs as well as to build secure and efficient systems, contributing to our products and services' ongoing security and privacy. This is a remote position.
Key Responsibilities
System Analysis: Analyze systems to understand functionality, failure points, and consequences of failure.
Security Measure Circumvention: Bypass implemented security measures to gain access to sensitive data, including enabling debugging, forging or bypassing signatures, gaining elevated privileges, and simulating environmental and working conditions.
Binary Code Extraction and Analysis: Extract firmware, executables, and other sensitive data from embedded systems and analyze the extracted code for possible vulnerabilities and sensitive data, e.g. passwords, cryptographic keys, etc.
Side‑Channel Analysis and Fault Injection: Setup and perform side‑channel analysis to recover sensitive data, e.g. cryptographic keys, sensitive plaintext, etc. Perform fault injection attacks to bypass security measures and/or recover sensitive data.
Exploit Development: Develop custom and novel exploits to bypass security measures, recover sensitive data, or gain elevated privileges in embedded systems.
Documentation: Prepare detailed documentation, including physical setups, testing procedures, and user guides, for reproducibility of results and maintenance.
Continuous Learning: Stay current with the latest advancements in reverse engineering and hardware security to continually refine and enhance skills.
Position Requirements
Ability to obtain and maintain a US government security clearance.
Bachelor's degree in Electrical Engineering, Computer Engineering, or a related field.
Experience reverse engineering embedded systems using standard tools such as IDA Pro, Ghidra, etc.
Experience working with FPGAs, hardware description languages (VHDL, Verilog), microcontrollers, SoCs, and related hardware (Flash, SRAM, DRAM, etc.).
Strong programming skills in scripting languages (Python, JavaScript, bash) and C/C++ for hardware/software integration.
Experience with standard interfaces (AXI, SPI, UART, JTAG).
Strong analytical and problem‑solving skills, with the ability to understand complex software and hardware designs.
Strong documentation skills and the ability to convey complex information clearly and effectively.
Collaborative mindset and excellent communication skills to work effectively with cross‑functional teams.
Experience in hardware security and reverse engineering techniques.
Preferred Qualifications
Advanced degree (M.S. or Ph.D.) in Electrical Engineering, Computer Engineering, or a related field.
Knowledge of cryptographic algorithms and experience implementing mathematical algorithms in hardware or software.
Experience in tamper detection and anti‑reverse engineering techniques.
#J-18808-Ljbffr
  • United States

Compétences linguistiques

  • English
Avis aux utilisateurs

Cette offre provient d’une plateforme partenaire de TieTalent. Cliquez sur « Postuler maintenant » pour soumettre votre candidature directement sur leur site.