We’re looking for an Embedded Security Engineer with strong embedded fundamentals and hands-on experience with hashing mechanisms and cryptographic algorithms. You’ll analyze, validate, and improve hash-based security features across firmware and device software, spanning low-level performance, hardware acceleration, boot/update chains, integrity checks, and key-derivation flows.
What you’ll do
- Design and implement hash-based integrity and authenticity mechanisms for embedded systems (e.g., firmware integrity checks, secure update validation).
- Analyze and validate cryptographic implementations used in embedded boot and update flows, and integrate improvements where needed.
- Optimize for performance, memory, and power; leverage hardware crypto accelerators when available.
- Build and maintain test vectors, fuzzing strategies, and validation harnesses for cryptographic code.
- Perform security reviews and threat modeling for embedded security features.
- Assess cryptographic behavior at the firmware/hardware boundary (e.g., secure storage, entropy, device identity) and document findings clearly.
Must-have
- 3+ years of experience developing embedded firmware in C/C++ (Rust is a plus).
- Strong knowledge of hash functions and hash-based constructions (e.g., SHA-2/SHA-3, HMAC, HKDF).
- Experience working within embedded constraints (RTOS/bare metal, limited memory, timing constraints, on-target debugging).
- Familiarity with secure coding practices, code review, and security testing.
Tech stack
- Languages: C, C++, Python (test tooling), optional Rust
- Crypto: mbedTLS / wolfSSL / OpenSSL / TinyCrypt
- Tooling: CMake, GCC/Clang, CI, GDB/OpenOCD, static analysis