Posted:1 day ago|
Platform:
On-site
Full Time
A technically strong Security Researcher who can:
Identify and analyze vulnerabilities in automotive and aviation systems
Conduct deep technical research across hardware, firmware, and network layers
Translate research findings into actionable remediation, strategy, and compliance guidance
The ideal candidate must be highly skilled in embedded systems security, with a strong balance between software reverse engineering, hardware debugging, and protocol analysis.
They should have hands-on experience with real devices, test benches, and security toolchains.
Embedded Hardware Debugging:
JTAG, UART, SPI, I²C
Hands-on use of oscilloscopes, multimeters, logic analyzers
Hardware teardown and side-channel/fault analysis
Tools: Ghidra, IDA Pro, Radare2, Binwalk, Strings
Architectures: ARM, MIPS, etc.
Automotive: CAN, UDS, LIN, FlexRay, MOST
Aviation: ARINC-429/629, ADS-B, ACARS, SATCOM
Python (primary), plus C/C++ and Bash
Experience developing tools, parsers, and fuzzers
Familiarity with fuzzing frameworks like AFL, libFuzzer
Capture, interpret, and analyze firmware and network logs
Identify anomalies and threat vectors
Ability to gather open-source data, map attack surfaces, and detect emerging threats
Analytical mindset: Can dissect complex systems and uncover hidden flaws
Independent & proactive: Self-starter who drives research and owns results
Collaborative: Able to work with engineers, compliance, and risk teams
Clear communicator: Writes detailed reports, impact analyses, and executive summaries
Candidates who demonstrate advanced or specialized experience will stand out:
Certifications (OSCP, CREST, GIAC, SANS Embedded Security)
Familiarity with safety-critical standards (ISO 26262, DO-178C)
Understanding of cryptographic hardware (TPMs, HSMs, secure boot)
History of public research contributions (CVE disclosures, talks, blogs)
Exposure to cloud or telemetry systems for connected vehicles or aircraft
Security clearance (or willingness to obtain one)
Comfortable working with:
Hardware: CAN/LIN interfaces, JTAG debuggers, SDRs, analyzers
Software: Ghidra, IDA, Wireshark, Python toolchain, Scapy
Lab: Safe, isolated test benches with network/RF isolation
Collaboration tools: Git, Jira/YouTrack, documentation & disclosure systems
Must follow strict safety, legal, and disclosure protocols
Comfortable operating within regulated automotive/aviation frameworks
Professional, ethical, and compliant in all engagements and disclosures
XFactor Talent
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Practice Python coding challenges to boost your skills
Start Practicing Python NowExperience: Not specified
Salary: Not disclosed
Experience: Not specified
Salary: Not disclosed