Build critical security features spanning our entire product portfolio ranging from secure storage, resilient device on-boarding, and embedded Linux security solutions
Collaborate with product engineering teams to design, review, and develop solutions that provide customers with credible products
Collaborate with hardware engineers on trusted computing security features such as secure boot, cryptographic accelerators, and tamper protection features
Contribute to security requirements and technical guidelines for new products and vendor engagements
Conduct comprehensive security testing and audits of Meraki networking products using industry-leading tools and techniques, and partner with development teams to remediate vulnerabilities
Provide guidance and training to internal teams and partners on security standards.
Triage incoming product security issues from public bug bounty program
Influence security-by-design concepts for new and trusted products
You are an ideal candidate if you have:
A Bachelor’s degree in Computer Science, Information Security, or 7+ years of related work experience
5+ years of experience in hardware security, embedded system security, authentication and security protocols, PKI, cryptography and cryptographic protocols.
Excellent collaboration skills to work effectively with multi-functional teams and influence product security roadmaps
Familiar with modern security analysis tools (static analysis, fuzzing, AI-assisted code analysis, etc), development lifecycle processes, and common security standards (NIST, CIS, ISO, etc)
Experience in performing source code-enabled security assessments, root cause, and adjacency analysis in C/C++, Golang, Rust, and Ruby.
Deep understanding of networking protocols, security controls, secure network architectures and common attack vectors
Experience with secure development lifecycle practices such as security requirements, architecture review, threat modeling, code review, SAST, DAST etc
A background in using source-level debuggers, hardware/JTAG debuggers, network protocol analyzers, or logic analyzers to diagnose problems at all layers of the system
An ability to explain sophisticated security problems and provide expert advice on secure design
Bonus points for:
Experience with IoT platforms, large-scale distributed systems, and/or client-server architectures
Experience implementing various Defense in Depth Strategies to address dynamic threats across various software and hardware stacks
Experience employing security controls within embedded build systems
Active involvement in network security community (conferences, research, open source projects)
Knowledge of machine learning, data analytics, and other innovative ways to security