+30 km
Uren
Opleiding
Dienstverband
Ervaring
Salaris
Datum
Bedrijfstype
Zoek vacatures
Soortgelijke vacatures omgeving Amsterdam.
Laad meer vacatures

Security Engineer Hardware Design/Embedded Systems – Security Systems Specialist Amsterdam Base Cyber Security

Solliciteer nu
Solliciteer via Werkzoeken.nl (zonder cv)
Opslaan
Solliciteer nu
Opslaan
Delen

Gevraagd

  • Fulltime
  • HBO of hoger

Aanbod

  • Freelance
 

Vacature in het kort

Amsterdam
Are you passionate about enhancing product security and eager to join a diverse, multi-national team? As a security engineer/analyst, you'll play a vital role in evaluating and improving the security of customers' products across various domains, including hardware design, embedded systems, mobile, and automotive security. Dive deep into research, conduct assessments, and contribute to secure hardware design, vulnerability analysis, and code reviews. Engage with us to explore this exciting opportunity and help bring secure products to market. Continue reading to find out why we could be the ideal fit for you.
 

Over het bedrijf

Base Cyber Security
Werving en selectie
Bedrijfsprofiel
 

Volledige vacaturetekst

Are you an experienced and motivated security engineer / analyst, with experience (and ideally passion!) in assessing secure systems in some (or all!) of these areas: hardware design, embedded systems, common criteria evaluations, mobile security, automotive specific hardware/software, code reviews etc.? Like to do research, assessments and help improve the security of products and systems? Join a well-established, diverse and multi-national team, and play a critical role in analyzing and evaluating the security of our customers’ products, helping them bring secure products to the market.

More information and full details available – reach out for a full conversation and insight on the role, the team, the organization and overall environment.

Key Responsibilities (depending on your area of experience):

  • Common Criteria Evaluation: Conduct evaluations based on the Common Criteria (ISO 15408) to assess the security attributes of our products and systems.
  • Secure Hardware Design: Lead the design and implementation of secure hardware components and systems. Identify vulnerabilities, ensure adherence to secure coding practices, and recommend remediation strategies.
  • Logical Software Vulnerability Assessment: Analyze software components to identify logical vulnerabilities arising from design flaws, coding errors, or unexpected interactions.
  • Security Code Review: Perform comprehensive security code reviews, focusing on critical components
  • Embedded Systems Security: Design and implement security measures for embedded systems, protecting against unauthorized access and data manipulation.
  • Automotive/Mobile Solutions Security: Assess the security of automotive and mobile solutions, identifying potential vulnerabilities and devising strategies to counter remote attacks, secure communication channels, and protect user data.
  • Mobile Solutions Security: Drive the security enhancement of mobile devices and applications.
  • Conduct comprehensive security assessments by performing vulnerability analysis and penetration testing on customer products.

Skills and Requirements:

  • Bachelor’s degree in Computer Science, Computer Engineering, Telco Engineering, or Electrical Engineering, or similar education qualification.
  • Excellent communication and technical writing skills for producing comprehensive security reports.
  • Proven ability to work independently (and at times without supervision as required).
  • Passion for technical work; strong research-oriented mindset, diving deep into hardware and software technical details.
  • Similar experience as a security engineer, security analyst, embedded systems engineer, embedded systems developer or similar a plus.

Technical Skills:

  • Expertise in in at least some of the following technical areas:
  • Experience in languages such as C, Python, Java, Assembly, VHDL, or Verilog.
  • Experience in identifying and exploiting software vulnerabilities, with or without access to the source code.
  • Knowledge of electronics, embedded systems, chip design, and cryptography (at least the fundamentals).
  • Experience in chip security and smart card security.

Get in touch to discuss further and share more details on this or other relevant opportunities (including discussing your career in information security in general!).

Relevant terms: Product security assessments, Embedded security, Embedded systems security, Common Criteria, IoT security, Secure Hardware design, security code review, automotive security, mobile security, logic vulnerabilities, hardware security, chipset assessments, C, C++, Java, Python, Assembly, Verilog, VHDL, Security by Design, Secure Hardware, TEE, Boot ROM, Encryption, Encryption Algorithms, TPM, Trusted Execution Environment, hardware based isolation, secure enclave, chip assessments, hardware security architecture, secure design reviews, ISO 15408, Product Life Cycle security, CC Evaluations, TOE / ST, Security state, security attributes.

Base Cyber Security helps organizations build knowledge and capabilities in information security. Supporting organizations putting together strong infosec teams or finding the right cyber security experts for their needs is a big part of that.

We work with security professionals globally for information and cyber security roles and projects across all industries in Europe. Whether you are starting your career in information security, need advice for your next step, deciding on how to build knowledge or choose a growth area in security to continue with, let’s have a conversation!

If you have not yet registered with the Base Cyber Security network, be sure to do so! Send us your details at via de button "Solliciteer nu" op deze pagina. & follow us on Twitter@BaseCyberSec to stay up to date with our activities and relevant info.

By registering with the security community and / or showing interest in a specific role, project or team, you agree with sharing your personal information with Base Cyber Security, which will in turn collect, use and process this in an ethical, private and compliant (including under the GDPR where applicable) manner.

Vacature opslaan
 Vacature delen
Sluit
Je notitie is succesvol opgeslagen
Voeg een notitie toe aan deze vacature
Opslaan
Sluit
Bedankt, je melding is verstuurd
Rapporteer deze vacature
Leg kort uit waarom je deze vacature rapporteert:
Versturen
Terug naar vacatures
Sluit
Kies 1 of meer
Sluit
Vacature opgeslagen
Klik op het hartje bovenaan de pagina om je opgeslagen vacatures te zien.
Terug naar vacatures
Sluit
Vul een in