Expoint – all jobs in one place
המקום בו המומחים והחברות הטובות ביותר נפגשים
Limitless High-tech career opportunities - Expoint

Apple Red Team Platform Hardware Security Researcher 
United States, California, Cupertino 
895434587

Yesterday
You’ll be working alongside teammates with diverse technical backgrounds including mobile and console research, binary instrumentation, SoC microarchitecture, compiler development, applied fault injection, and more. If you have your own area of fascination and a love of low-level security, you’ll find yourself right at home!In this role you will...- Provide hardware and firmware security design assistance - Audit security critical firmware and hardware.- Create tools that help automate security verification, testing, or research.- Reverse engineer exploits, if necessary.- This position may require occasional travel to other Apple sites, vendors, and security conferences.
  • A proven track record in finding security vulnerabilities in shipping products and/or designing platform security countermeasures.
  • Programming background in C, C++, and/or Objective-C. Additionally, must have proficiency in scripting language(s) such as Python.
  • Proficiency with assembly languages, ARM a big plus.
  • Familiarity with modern processor and SoC architecture.
  • Background in secure programming patterns and code auditing.
  • Have an understanding of past, current, and emerging security exploit classes.
  • Proficiency with operating system internals, especially macOS, iOS, or other flavors of UNIX
  • Have the ability to track and lead multiple parallel projects.
  • Familiarity with collaborating with partner teams in hardware, software, and product groups to define and deliver rigorous security features
  • Relevant experience or education, such as performing security research and analysis or a Bachelor's degree in Computer Science or related field. We are open to strong candidates with no formal education.
  • Experience creating working proof of concepts from found vulnerabilities on systems with advanced countermeasures (ASLR, TZ, PAC, etc).
  • Exposure to kernel or driver programming.
  • Reverse engineering using tools such as IDA Pro.
  • Familiarity with the principles and use of cryptographic primitives and protocols.
Note: Apple benefit, compensation and employee stock programs are subject to eligibility requirements and other terms of the applicable plan or program.