At a Glance
- Tasks: Evaluate and enhance security for embedded devices using cutting-edge techniques.
- Company: Join IOActive, a leader in cybersecurity with a global presence.
- Benefits: Competitive pay, performance incentives, travel opportunities, and access to top-notch tech teams.
- Other info: Dynamic, collaborative environment with a commitment to diversity and inclusion.
- Why this job: Make a real-world impact in cybersecurity while working on innovative projects.
- Qualifications: Expertise in embedded security, programming languages, and vulnerability assessment required.
The predicted salary is between 60000 - 80000 £ per year.
About IOActive: IOActive, a trusted partner for Global 1000 enterprises, provides research-fueled security services across all industries. Our cutting-edge cybersecurity teams provide highly specialized technical and programmatic services including full-stack penetration testing, program efficacy assessments, and hardware hacking. IOActive brings a unique attacker’s perspective to every engagement to maximize cybersecurity investments and improve the security posture and operational resiliency of our clients. Founded in 1998, IOActive is headquartered in Seattle with global operations, including state of the art hardware hacking labs in Seattle, WA, Madrid, Spain and Cheltenham, UK.
This is not a Remote position. This position is expected to report for work at our security lab in Cheltenham, United Kingdom.
Who you are: Our Embedded Device Security consultants maintain a high level of expertise regarding threats and technical advances in embedded security. This position requires expert knowledge in areas such as C, Java, assembly languages, open platforms, and cryptography. Intellectual curiosity, the ability to navigate ambiguous environments and a bias to action are critical competencies required for success.
What you'll do:
- Perform high-end security evaluations and research for our clients, focused on a range of embedded devices
- Work with other team members to deliver high-quality results to IOActive’s clients throughout the world
- Investigate possible logical attack scenarios by interpreting the code review findings, orienting the attack paths, and analyzing the test results
- Develop sophisticated, state-of-the-art attacks that integrate the latest attack methods against embedded products
- Create tools to assist in project goals
- Communicate complex vulnerabilities to both technical and non-technical client staff
- Perform research on new attack vectors, discover new vulnerabilities, create new exploitation techniques
- Evangelize IOActive Labs through blogs, white papers, presentations, etc.
- Support business development efforts through the scoping of engagements
What you bring:
Required Technical Skills- Rapid identification of attack surfaces and entry points using implicit threat modeling techniques
- Ability to connect and use JTAG/on-chip Debuggers
- Low-level C code review
- FreeRTOS, Android, Linux kernel drivers, protocol parsing
- Sandbox policy review: SELinux/SE Android, seccomp, Linux name spaces, Minijail/Firejail
- Crypto implementation code reviews, specifically for secure boot and code signing
- Java, especially Android app side
- ARM 32- and 64-bit assembly
- Extensive Git/GitHub experience
- Wi-Fi/Bluetooth
- Reverse engineering, specifically firmware
- Hardware/embedded system hacking
- Vulnerability assessment and penetration testing
- Knowledge of security-related topics, such as authentication, entitlements, identity management, data protection, data leakage prevention, validation checking, encryption, hashing, principle of least privilege, software attack methodologies, secure data transfer, secure data storage
- Ability to work independently under deadline
- Rigorous attention to detail and strong analytic skills
- Ability to write test plans based upon initial impressions and discussions with the team
- Comfortable navigating large codebases with minimal guidance
- Excellent command of written and spoken English
- Comfortable working as part of a multinational and multidisciplinary team
- Logical and structured approach to projects
- 3-5 years or more of relevant work experience in a high-paced, enterprise consulting environment
What We Offer: A chance to work with an industry leader in cyber security, access to world-class technical teams and research, a high-energy, collaborative team that values innovation, opportunities for travel, competitive compensation and performance-based incentives.
If this sounds like your kind of challenge, we’d love to hear from you. Let’s talk!
Why IOActive: The IOActive mission is to make the world a safer, more secure place from cyber threats with research and services that focuses on security that has real-world impact. Join a team committed to making a difference.
IOActive is an equal opportunity employer that is committed to diversity and inclusion in the workplace. We prohibit discrimination and harassment of any kind based on race, color, sex, religion, sexual orientation, national origin, disability, genetic information, pregnancy, or any other protected characteristic as outlined by federal, state, or local laws. This policy applies to all employment practices within our organization, including hiring, recruiting, promotion, termination, layoff, recall, leave of absence, compensation, benefits, training, and apprenticeship. IOActive makes hiring decisions based solely on qualifications, merit, and business needs at the time.
Embedded Device Security Consultant - Cheltenham employer: "Making the world a safer and more secure place"
Contact Detail:
"Making the world a safer and more secure place" Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Embedded Device Security Consultant - Cheltenham
✨Tip Number 1
Network like a pro! Reach out to current employees at IOActive on LinkedIn or attend industry events. A friendly chat can give you insider info and maybe even a referral!
✨Tip Number 2
Show off your skills! Prepare a mini-project or a case study related to embedded device security. This will not only demonstrate your expertise but also your passion for the field.
✨Tip Number 3
Practice makes perfect! Get ready for technical interviews by brushing up on your C, Java, and assembly languages. Use platforms like StudySmarter to sharpen your skills and boost your confidence.
✨Tip Number 4
Don’t forget to apply through our website! It’s the best way to ensure your application gets seen by the right people. Plus, it shows you’re genuinely interested in joining the team!
We think you need these skills to ace Embedded Device Security Consultant - Cheltenham
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Embedded Device Security Consultant role. Highlight your relevant skills in C, Java, and cryptography, and don’t forget to mention any experience with embedded systems or hardware hacking.
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to showcase your passion for cybersecurity and how your background aligns with IOActive's mission. Be sure to mention specific projects or experiences that demonstrate your expertise.
Showcase Your Technical Skills: In your application, be clear about your technical skills and experiences. Mention your familiarity with JTAG, low-level C code review, and any other relevant tools or languages. We want to see how you can contribute to our cutting-edge work!
Apply Through Our Website: We encourage you to apply directly through our website. It’s the best way for us to receive your application and ensures you’re considered for the role. Plus, it shows you’re serious about joining our team!
How to prepare for a job interview at "Making the world a safer and more secure place"
✨Know Your Tech Inside Out
Make sure you brush up on your knowledge of C, Java, and assembly languages. Be prepared to discuss specific projects where you've applied these skills, especially in embedded security contexts. This will show that you not only understand the theory but can also apply it practically.
✨Demonstrate Your Problem-Solving Skills
IOActive values intellectual curiosity and the ability to navigate ambiguous environments. Prepare to share examples of how you've tackled complex security challenges in the past. Think about specific attack scenarios you've investigated and how you approached them.
✨Communicate Clearly
You’ll need to explain complex vulnerabilities to both technical and non-technical audiences. Practice articulating your thoughts clearly and concisely. Consider doing mock interviews with friends or colleagues to refine your communication style.
✨Show Your Passion for Cybersecurity
IOActive is looking for someone who is genuinely interested in cybersecurity. Bring along any blogs, white papers, or presentations you've created. This not only showcases your expertise but also your commitment to the field and willingness to share knowledge.