Expoint - all jobs in one place

מציאת משרת הייטק בחברות הטובות ביותר מעולם לא הייתה קלה יותר

Limitless High-tech career opportunities - Expoint

ARM System Security Architect 
United Kingdom, England, Cambridge 
532555547

21.04.2025

System Security Assessment (Hardware + Firmware):

  • Lead architecture-level security assessments and risk analyses across SoC and low-level firmware components.
  • Conduct in-depth threat modeling of boot flows, firmware, memory protection mechanisms, and secure execution environments.
  • Detailed attack-modelling and review security features across firmware interfaces.

Firmware Security Review:

  • Evaluate firmware-level implementation of security critical features.
  • Collaborate with firmware and SoC teams to ensure secure firmware architecture, including the handling of secrets, keys, and hardware-backed security features.

Technical Leadership & Collaboration:

  • Guide engineering teams in applying standard methodologies in security during architecture, design, and verification phases.
  • Communicate security design decisions clearly to technical and non-technical stakeholders.
Required Skills and Experience :
  • A track record securing system architectures at the intersection of hardware and firmware.
  • Deep experience in areas such as secure boot, key provisioning, firmware mitigations, and hardware-enforced isolation.
  • Understanding of threat models including firmware exploitation, privilege-escalation, code injection, and side-channel attacks.
  • Solid grasp of Arm TrustZone, secure world monitor designs, memory and IO protection mechanisms, and SoC-level isolation techniques.
  • Experience identifying low-level security flaws and recommending hardware or firmware-level fixes.
  • Ability to lead technical discussions across architecture, firmware, software, and validation teams.
“Nice To Have” Skills and Experience :
  • Familiarity with RTL design, UVM/SystemVerilog, or hardware verification flows.
  • Experience with trusted execution environments (TEEs) and secure monitor implementation.
  • Understanding of secure firmware update mechanisms (rollback protection, anti-cloning).
  • Prior work with TPMs, Secure Elements, or other hardware security modules.
  • Contributions to security standards or academic research in system security, firmware security, embedded cryptography, side channel attacks.