About the job
Key Responsibilities
Craft and implement a robust end-to-end security architecture tailored for SoC-based products.
Develop features for Secure Boot and Anti-rollback mechanisms.
Manage Key Provisioning alongside Hardware Root of Trust.
Oversee Secure Lifecycle State management (LCS) for firmware, keys, and devices.
Design and integrate security modules to enhance firmware and system-level defenses.
Conduct thorough vulnerability assessments, attack surface evaluations, and implement memory protection hardening strategies.
Integrate, validate, and optimize hardware cryptographic engines including AES/GCM engines, TRNG, PKA, RSA, PQC, and hash accelerators.
Establish secure firmware update and rollback protocols along with comprehensive product lifecycle controls.
Qualifications
Deep understanding of embedded security principles, including Secure Boot, key management, and cryptography.
Demonstrated experience with TLS, X.509, ECC, AES, and various cryptographic or security libraries.
Proficient in C/C++ or Rust for developing secure system software.
Experience identifying and analyzing security vulnerabilities in SoC/FPGA-based systems.
Practical experience with hardware cryptographic engines and security IP blocks (e.g., AES/GCM, SHA accelerators, TRNG/DRBG, PKA).
Solid understanding of firmware and key lifecycle management.
Preferred Qualifications
Familiarity with TPM, HSM, TrustZone, OP-TEE, or related hardware security architectures.
Experience in implementing secure firmware signing, provisioning, and deployment pipelines.
Background in validating cryptographic engines under standards such as FIPS 140-3, NIST CMVP.
Security engineering experience specifically for AI accelerators, networking chips, or SoCs.
Contribute to development practices aligned with standards such as FIPS, PSA Certified, CAVP, and CMVP.
