What you’ll be doing:
Identify vulnerabilities in our Data Center Systems using both static and dynamic analysis
Fix bugs in close cooperation with our development teams.
Ensure the quality and robustness of our pre-release products
Evangelize tools, practices, and plans to increase product reliability and security
What we need to see:
BS or MS degree in Computer Engineering, Computer Science, or related degree (or equivalent experience)
7+ years in a security engineering or vulnerability researcher role. 4+ years of meaningful software engineering experience
Exceptional C, ARM assembly, and Python programming skills
Experience auditing network appliances, Linux applications, and embedded firmware
Experience with secure coding practices and tooling, including static analysis tools such as Coverity, IKOS, and Checkmarx and dynamic analysis tools such as AFL, Peach, Bullseye, and LDRA.
Knowledgeable in modern server architecture, hypervisor security research, and firmware analysis
Effective written and verbal communication, regardless of audience or issue complexity
Ability to work collaboratively and remotely with others to accomplish complex goals
Ways to stand out from the crowd:
Background in reverse engineering and exploitation.
Experience working with micro-architecture, programmable pin-outs, or trusted computing
Experience and familiarity with GPU-accelerated computing systems. Experience decomposing and completing complex technical tasks
Published CVEs, security analysis, or related work samples. You are an asset if you are familiar with computer system architecture, microprocessor, and microcontroller fundamentals (caches, buses, memory controllers, DMA, etc.)
You will also be eligible for equity and .
משרות נוספות שיכולות לעניין אותך