The point where experts and best companies meet
Share
What you will be doing:
Research vulnerabilities on cutting-edge SoC and GPU designs
Develop and use cutting-edge security tools and techniques
Guide the continuous integration of latest mitigations into our security architecture
Research and exploit side-channel, fault, and advanced physical attacks
What we need to see:
BS/BA degree in Computer Science or Computer Engineering or Electrical Engineering or equivalent experience
6+ years of work experience in a Security related field
Experience with ARM/RISCV assembly, Verilog and low-level C programming
Understanding of large SoC and ASIC architecture and design
Experience with security code reviews of complex firmware projects and defensive coding best practices (SDL, threat modeling)
Ability to work collaboratively and remotely with multiple experts to accomplish complex goals
Expertise in two of more of the following fields:
Expertise in side-channel analysis and mitigation for cryptographic primitives
TEE (TrustZone, SE), Confidential Computing, and/or microarchitectural attacks
Proficiency with Symbolic Execution and/or fuzzing tools
JTAG, debugging, binary instrumentation frameworks, ChipWhisperer
Reverse-engineering (IDA Pro, Ghidra)
Practical experience in utilizing machine learning techniques for performing side-channel attacks
Track record of advancing offensive security research field through vulnerability discoveries, research publications, and/or developing security tools
Ways to stand out from the crowd:
Understanding of pre-silicon hardware design and testing
Knowledge of key hardware security architecture components, and their implementation in complex SoC designs
Strong background in computer architecture, especially GPU or AI accelerator design
You will also be eligible for equity and .
These jobs might be a good fit