Information Security Engineer III

BASIC QUALIFICATIONS
· BS in Computer Science, Information Security, or related field, or equivalent work experience
· Demonstrated grasp of crypto basics (encryption, signing, certificates, SHA, AES, RSA, etc)
· Demonstrated grasp of basic network security (DHCP, DNS, SSH, ACLs, common ports)
· Minimum 1 year security assessment (penetration testing, network traffic analysis)
· Minimum 2 years of experience supporting teams with design input and security risk analysis
· Minimum 4 years of experience with:
· x86 and/or ARM chipset and firmware security (TPM, UEFI, TrustZone, secure boot)
· Physical hardware security (PCB, JTAG, UART, SPI, ROM, microcode, custom ASIC/FPGA)
· Minimum 4 years of experience with at least one of the following categories:
· Local encryption and key management (LUKS, BitLocker, self-encrypting drives, etc)
· PKI and code signing architecture (X.509, EV SSL, certificate pinning, OCSP, CRL, etc)
· Hardware penetration testing (e.g. bus/protocol analysis, debug, power/timing, fuzzing, etc)
· Low-level programming in C and assembly (e.g. drivers, CPU microcode, ROMs)

PREFERRED QUALIFICATIONS
· 6+ years of experience in two or more of the categories above
· Excellent written and verbal communication skills, and ability to drive toward consensus
· Relevant industry certifications (CISSP, SANS/GIAC, CompTIA, Microsoft, Linux, AWS)
· Hands-on experience performing security assessments of hardware/embedded devices
· Some knowledge of recognized security standards (TCG, IEEE, NIST, FIPS, PCI-DSS)
· Some knowledge of hardware design (ROM/EEPROM, fuses, integrated circuits, NAND)
· Some knowledge of AWS core services (EC2, S3, IAM, Greengrass, Lambda, KMS, VPC)
· Intermediate knowledge of common security protocols (e.g. RDP, TLS, SNMP, SSH, IPMI)
· Intermediate knowledge of hardware cryptography (certificates, attestation, TPM/HSM)
· Intermediate knowledge of embedded/IoT solution design and security considerations
· Expert knowledge of security risk management and hardware security mitigation strategies

You may return to your current search results by clicking here.

Latest Job Listings