Senior Embedded Security Consultant - Cheltenham
Role details
Job location
Tech stack
Job description
Embedded Device Security Consultants are responsible for performing high-end security evaluations and research for our clients, focused on a range of embedded devices. In this role, you will work with other team members to deliver high-quality results to IOActive's clients throughout the world.
Our consultants maintain a high level of expertise regarding known threats and technical advances in embedded security. This position requires expert knowledge in areas such as C, Java, assembly languages, open platforms, and cryptography.
The Embedded Device Security Consultant will undertake advanced level security evaluation tasks and duties in order to meet customer requirements and project deadlines.
What you'll do:
- Investigate possible logical attack scenarios by interpreting the code review findings, orienting the attack paths, and analyzing the test results
- Develop sophisticated, state-of-the-art attacks that integrate the latest attack methods against embedded products
- Create tools to assist in project goals
- Communicate complex vulnerabilities to both technical and non-technical client staff
- Perform research on new attack vectors, discover new vulnerabilities, create new exploitation techniques
- Evangelize IOActive Labs through blogs, white papers, presentations, etc.
- Support business development efforts through the scoping of engagements
Requirements
- Rapid identification of attack surfaces and entry points using implicit threat modeling techniques
- Ability to connect and use JTAG/on-chip Debuggers
- Low-level C code review
- FreeRTOS, Android, Linux kernel drivers, protocol parsing
- Sandbox policy review: SELinux/SE Android, seccomp, Linux name spaces, Minijail/Firejail
- Crypto implementation code reviews, specifically for secure boot and code signing
- Java, especially Android app side
- ARM 32- and 64-bit assembly
- Extensive Git/GitHub experience
- Wi-Fi/Bluetooth
- Reverse engineering, specifically firmware
- Hardware/embedded system hacking
- Vulnerability assessment and penetration testing
- Knowledge of security-related topics, such as authentication, entitlements, identity management, data protection, data leakage prevention, validation checking, encryption, hashing, principle of least privilege, software attack methodologies, secure data transfer, secure data storage
Consulting Skills + Experience
- Ability to work independently under deadline
- Rigorous attention to detail and strong analytic skills
- Ability to write test plans based upon initial impressions and discussions with the team
- Comfortable navigating large codebases with minimal guidance
- Excellent command of written and spoken English
- Comfortable working as part of a multinational and multidisciplinary team
- Logical and structured approach to projects
- 3-5 years or more of relevant work experience in a high-paced, enterprise consulting environment
Benefits & conditions
A chance to work with an industry leader in cyber security
Access to world-class technical teams and research
A high-energy, collaborative team that values innovation
️ Opportunities for travel
Competitive compensation and performance-based incentives
If this sounds like your kind of challenge, we'd love to hear from you. Let's talk!
Why IOActive:
We have over 25 years of experience that's established and stable; yet high-growth with the energy, passion and dynamic work environment of a startup. We are renowned for our innovation and thought leadership within our high-profile, cutting edge space. We're one of "the good guys" doing crazy cool stuff to thwart bad guys in a critically important business, social and political arena. Our work is great fun with great importance. Above all else, we value our people and our customers. Relationships matter.