Embedded Exploitation Engineer / AI / Startup
Role details
Job location
Tech stack
Job description
A startup backed by tier-1 US VCs and industry leaders is looking for exceptional Embedded Exploitation Engineers with a strong background in reverse engineering with embedded firmware and bare-metal systems. You'll identify and exploit vulnerabilities in embedded systems, IoT devices, and real-time operating systems. While also reverse engineering firmware to map attack surfaces, discover bugs, and develop reliable exploits. You'll step away from purely manual research and move towards developing AI systems. Due to the type of role, all candidates must be eligible for security clearances.
Requirements
Ideal candidates have at least 2+ YOE in reverse engineering with embedded firmware and bare-metal systems. Candidates must also have a deep understanding of ARM, MIPS or other embedded architectures and have proven vulnerability research experience with CVEs, advisories, or offensive work on embedded targets. You must be comfortable owning systems end to end and working in a startup environment, where you'll wear multiple hats and have the autonomy to drive ownership and navigate ambiguity., * 2+ years of experience in cybersecurity engineering
- Strong reverse engineering with embedded firmware and bare-metal systems work
- Deep understanding of ARM, MIPS or other embedded architectures
- Extensive experience with vulnerability research with CVEs, advisories, or offensive work on embedded targets
- Engineering experience at xAI, Anthropic, Scale, Palantir, or similar high-bar AI companies
- Strong C/C++ skills for low-level exploit
- Proficiency with hardware debugging and firmware extraction (ie: JTAG, UART, SPI/I2C)
- Experience with RTOS platforms a big plus
- All candidates must be eligible for security clearance