IoT / ICS / OT Penetration Tester
Мэтч & Сопровод
Для мэтча с этой вакансией нужен Plus
Описание вакансии
TL;DR
IoT / ICS / OT Penetration Tester (Cybersecurity): Conducting hands-on security assessments of connected devices, embedded systems, industrial control systems, and automotive platforms with an accent on hardware interaction, firmware reverse engineering, and wireless protocol testing. Focus on identifying vulnerabilities like memory corruption and authentication bypasses, performing supply chain analysis, and evaluating compliance with standards such as EU CRA and ISO 21434.
Location: United States or Canada
Company
Fast-growing series-B company building a platform for connected device cybersecurity across industries like healthcare, utilities, automotive, manufacturing, and critical infrastructure.
What you will do
- Plan and execute penetration tests on IoT, ICS/OT, and automotive targets including consumer devices, industrial controllers, ECUs, and telematics units.
- Perform hardware hacking with JTAG, SWD, UART, SPI, I2C, flash dumping, and PCB soldering to access debug interfaces.
- Conduct firmware reverse engineering using Ghidra and Binary Ninja to find vulnerabilities like memory issues and insecure updates.
- Assess wireless protocols such as BLE, Zigbee, Wi-Fi, CAN bus, and cellular interfaces.
- Review C/C++ source code, analyze SBOMs for supply chain risks, and evaluate compliance with regulations like EN 303 645 and ISO 21434.
- Produce detailed reports, leverage AI tools for analysis, collaborate with teams to improve platform detection, and support customer engagements.
Requirements
- Location: Must be in United States or Canada
- Bachelor's degree in Computer Science, Electrical Engineering, or related field.
- 5+ years hands-on experience in IoT, embedded, ICS/OT, or automotive security.
- Hardware security assessments: JTAG/SWD, SPI/I2C/UART, flash extraction, PCB soldering.
- Firmware RE with Ghidra/Binary Ninja on ARM, MIPS, etc.; IoT/automotive wireless protocols testing.
- C/C++ source code review for security weaknesses; SBOM familiarity; knowledge of standards like EU CRA, ISO 21434.
- Excellent communication for reports and presentations; Python/Bash scripting; AI-assisted tooling experience.
Nice to have
- Automotive security: OBD-II, ECU flashing, V2X, HSM.
- ICS/SCADA: Modbus, DNP3, OPC-UA.
- CVE history, certifications like OSCP/GPEN/GICSP.
- SAST/DAST for firmware, ML vulnerability detection, AWS experience.
Culture & Benefits
- Fully remote with high autonomy and ownership.
- Fast-moving team valuing transparency, innovation, impact, and CLARITY principles (Customer first, Leverage, Agency, Results, Integrity, Transparency, Why).
- Comprehensive benefits, learning stipends, equity in company growth.
- Opportunity to publish research, attend conferences, and solve pressing cybersecurity challenges.
Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →