Security Engineer IV - Project Based

Autonomous SolutionsLogan, UT
Onsite

About The Position

As a Security Engineer IV, you will lead penetration testing and red team operations across Autonomous Solutions Inc's software, firmware, and network stacks. You will simulate adversarial attacks against autonomous vehicle platforms, identify and exploit vulnerabilities in C, C++, and C# codebases, and deliver findings that drive measurable security improvements. This is a project-based role supporting the initial development phase of our autonomous vehicle platforms, where your offensive security expertise will directly shape how our systems are hardened before deployment.

Requirements

  • Bachelor's degree in Computer Science, Cybersecurity, Electrical Engineering, or a related field.
  • 8+ years of experience in penetration testing, red team operations, or offensive security.
  • Hands-on experience testing software written in C, C++, and C#.
  • Proficiency with offensive security tools such as Metasploit, Burp Suite, or similar frameworks.
  • Working knowledge of exploit techniques including memory corruption, privilege escalation, and lateral movement.
  • Familiarity with network attack vectors including TLS weaknesses, PKI misconfigurations, and protocol vulnerabilities.
  • Scripting experience in Python, Bash, or similar for exploit automation and tooling.
  • Familiarity with hardware security primitives such as Secure Boot, TPMs, or HSMs.

Nice To Haves

  • Relevant certifications such as OSCP, GPEN, GWAPT, or CEH preferred.

Responsibilities

  • Plan and execute penetration tests against software, firmware, network, and embedded system targets.
  • Conduct red team exercises that simulate adversarial attack scenarios against autonomous platforms.
  • Identify and exploit vulnerabilities in C, C++, and C# codebases through targeted security assessments.
  • Assess network attack surfaces including TLS implementations, certificate handling, and encrypted protocols.
  • Develop detailed findings, exploit chains, and remediation recommendations for engineering teams.
  • Operate offensive security tooling including exploit frameworks, SAST, DAST, and fuzzing platforms.
  • Validate remediations through re-testing to confirm fixes hold against known attack techniques.
  • Support evidence collection and audit preparation for SOC 2 and ISO 27001 assessments.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service