Embedded Exploitation Engineer / AI / Startup

Motion Recruitment Partners LLC.
Washington, United States of America
7 days ago

Role details

Contract type
Permanent contract
Employment type
Full-time (> 32 hours)
Working hours
Regular working hours
Languages
English
Experience level
Intermediate

Job location

Washington, United States of America

Tech stack

Artificial Intelligence
C++
Embedded Software
Firmware
Joint Test Action (IEEE Standards)
Real-Time Operating Systems
Reverse Engineering
Universal Asynchronous Receiver/Transmitter
Serial Peripheral Interface
Bare Metal
Hardware Debugging
Vulnerability Analysis

Job description

A startup backed by tier-1 US VCs and industry leaders is looking for exceptional Embedded Exploitation Engineers with a strong background in reverse engineering with embedded firmware and bare-metal systems. You'll identify and exploit vulnerabilities in embedded systems, IoT devices, and real-time operating systems. While also reverse engineering firmware to map attack surfaces, discover bugs, and develop reliable exploits. You'll step away from purely manual research and move towards developing AI systems. Due to the type of role, all candidates must be eligible for security clearances.

Requirements

Ideal candidates have at least 2+ YOE in reverse engineering with embedded firmware and bare-metal systems. Candidates must also have a deep understanding of ARM, MIPS or other embedded architectures and have proven vulnerability research experience with CVEs, advisories, or offensive work on embedded targets. You must be comfortable owning systems end to end and working in a startup environment, where you'll wear multiple hats and have the autonomy to drive ownership and navigate ambiguity., * 2+ years of experience in cybersecurity engineering

  • Strong reverse engineering with embedded firmware and bare-metal systems work
  • Deep understanding of ARM, MIPS or other embedded architectures
  • Extensive experience with vulnerability research with CVEs, advisories, or offensive work on embedded targets
  • Engineering experience at xAI, Anthropic, Scale, Palantir, or similar high-bar AI companies
  • Strong C/C++ skills for low-level exploit
  • Proficiency with hardware debugging and firmware extraction (ie: JTAG, UART, SPI/I2C)
  • Experience with RTOS platforms a big plus
  • All candidates must be eligible for security clearance

Apply for this position