At a Glance
- Tasks: Evaluate CPU vulnerabilities and recommend mitigation strategies in a remote team.
- Company: Leading Information Security Engineering team with a global presence.
- Benefits: Remote work flexibility, competitive pay, and opportunities for professional growth.
- Why this job: Join a cutting-edge team tackling microarchitectural security challenges.
- Qualifications: Deep knowledge of speculative execution and hands-on research experience required.
- Other info: Ideal for those seeking a PhD-level research environment.
The predicted salary is between 48000 - 72000 £ per year.
Location: London (Remote)
Duration: 9 Months
Mode: Remote
Role Overview
The team within Information Security Engineering (based primarily in Zurich, with members in Poland) evaluates CPU vendor-reported vulnerabilities, assesses their impact, and provides mitigation recommendations. The work is highly specialized and focused on CPU microarchitectural security (including RAM and GPUs).
Candidate Profile - Key Signals
- Non-negotiable/Strong Signals:
- Deep understanding of speculative execution and microarchitectural security.
- Hands-on research experience (PhD-level research counts as relevant experience).
- Experience discovering new microarchitectural attacks.
- Acknowledgement from CPU vendors for responsibly disclosing hardware vulnerabilities.
- Publications in reputable security venues.
- Implementing production-grade mitigations.
- Ability to unblock other engineering teams.
- Strong experimental/research methodology skills.
The work closely resembles PhD-level experimental research rather than general security engineering.
Hardware Security Engineer employer: Harvey Nash IT Recruitment UK
Contact Detail:
Harvey Nash IT Recruitment UK Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Hardware Security Engineer
✨Tip Number 1
Network like a pro! Reach out to professionals in the hardware security field on LinkedIn or at industry events. We can’t stress enough how valuable personal connections can be in landing that dream job.
✨Tip Number 2
Show off your expertise! Prepare a portfolio showcasing your research, publications, and any hands-on projects related to microarchitectural security. This will help us see your skills in action and set you apart from the crowd.
✨Tip Number 3
Practice makes perfect! Get ready for technical interviews by brushing up on your knowledge of speculative execution and microarchitectural attacks. We recommend doing mock interviews with friends or using online platforms to build your confidence.
✨Tip Number 4
Apply through our website! It’s the best way to ensure your application gets noticed. Plus, we love seeing candidates who take the initiative to connect directly with us.
We think you need these skills to ace Hardware Security Engineer
Some tips for your application 🫡
Show Off Your Expertise: Make sure to highlight your deep understanding of speculative execution and microarchitectural security in your application. We want to see your hands-on research experience, so don’t hold back on mentioning any relevant projects or publications!
Tailor Your Application: Customise your CV and cover letter to reflect the specific skills and experiences mentioned in the job description. We love seeing candidates who take the time to align their background with what we’re looking for!
Be Clear and Concise: When writing your application, keep it clear and to the point. We appreciate well-structured applications that make it easy for us to see your qualifications and how you can contribute to our team.
Apply Through Our Website: Don’t forget to apply through our website! It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it makes the whole process smoother for everyone involved.
How to prepare for a job interview at Harvey Nash IT Recruitment UK
✨Know Your Microarchitecture
Make sure you brush up on your knowledge of speculative execution and microarchitectural security. Be ready to discuss specific vulnerabilities you've encountered and how you've approached mitigating them in your past work.
✨Showcase Your Research Experience
Prepare to talk about your hands-on research experience, especially if it’s at a PhD level. Highlight any publications or acknowledgements from CPU vendors for responsibly disclosing vulnerabilities, as this will demonstrate your credibility in the field.
✨Demonstrate Problem-Solving Skills
Think of examples where you've implemented production-grade mitigations or unblocked other engineering teams. Be ready to explain your experimental methodology and how it led to successful outcomes in your projects.
✨Stay Current with Trends
Familiarise yourself with the latest trends and developments in hardware security. Being able to discuss recent microarchitectural attacks or advancements will show that you're engaged and knowledgeable about the field.