Embedded Device Security Consultant

Details of the offer

This is an exciting opportunity to work with a company who approaches security from a attackers mindset.
The consultants uncover weaknesses using the latest security research, time tested techniques to provide critical security services such as pen testing and red team services for software, hardware, networks or human resources.

The Embedded Device Security Consultant will undertake advanced level security evaluation tasks and duties in order to meet customer requirements and project deadlines.
This includes:
Investigate possible logical attack scenarios by interpreting the code review findings, orienting the attack paths, and analyzing the test results Develop sophisticated, state-of-the-art attacks that integrate the latest attack methods against embedded products Create tools to assist in project goals Communicate complex vulnerabilities to both technical and non-technical client staff Perform research on new attack vectors, discover new vulnerabilities, create new exploitation techniques Evangelize IOActive Labs through blogs, white papers, presentations, etc.
Support business development efforts through the scoping of engagements What you bring: Required Technical Skills Rapid identification of attack surfaces and entry points using implicit threat modeling techniques Ability to connect and use JTAG/on-chip Debuggers Low-level C code review FreeRTOS, Android, Linux kernel drivers, protocol parsing Sandbox policy review: SELinux/SE Android, seccomp, Linux name spaces, Minijail/Firejail Crypto implementation code reviews, specifically for secure boot and code signing Java, especially Android app side ARM 32- and 64-bit assembly Extensive Git/GitHub experience Wi-Fi/Bluetooth Reverse engineering, specifically firmware Hardware/embedded system hacking Vulnerability assessment and penetration testing Knowledge of security-related topics, such as authentication, entitlements, identity management, data protection, data leakage prevention, validation checking, encryption, hashing, principle of least privilege, software attack methodologies, secure data transfer, secure data storage
Consulting Skills + Experience Ability to work independently under deadline Rigorous attention to detail and strong analytic skills Ability to write test plans based upon initial impressions and discussions with the team Comfortable navigating large codebases with minimal guidance Excellent command of written and spoken English Comfortable working as part of a multinational and multidisciplinary team Logical and structured approach to projects 3-5 years or more of relevant work experience in a high-paced, enterprise consulting environment


Nominal Salary: To be agreed

Source: Whatjobs_Ppc

Requirements

Principal Cyber Project Management

Requisition ID: R10159281 Category: Program Management Location: Cheltenham, Gloucestershire, United Kingdom Clearance Type: Security Check (SC) Teleco...


Northrop Grumman Corp. (Au) - Gloucestershire

Published 12 days ago

Software Engineer

Software Engineering Opportunities | Defence / National Security Industry | Salaries up to £100,000 | Security Clearance Required | Cheltenham MERITUS are ...


Meritus - Gloucestershire

Published 12 days ago

Software Engineer Database

Software Engineering Opportunities | Defence / National Security Industry | Salaries up to £100,000 | Security Clearance Required | Cheltenham MERITUS are w...


Meritus - Gloucestershire

Published 12 days ago

Software Engineer With Devops Training

Software Engineering Opportunities | Defence / National Security Industry | Salaries up to £100,000 | Security Clearance Required | Cheltenham MERITUS are w...


Meritus - Gloucestershire

Published 12 days ago

Built at: 2025-01-18T12:26:54.383Z