About The Position

Primary Function of Position This role contributes broadly to the Product Cybersecurity organization by improving the overall security posture of software products, infrastructure, and services. The position involves developing security features and mitigations following guidance from security analysis, threat modeling and security testing. This role works collaboratively across multiple teams and product groups to ensure high-quality, secure products that meet regulatory and organizational standards within a fast-paced environment.

Requirements

  • Minimum 8 years of experience in cybersecurity, product security engineering or related field with a University degree; or 6 years experience and a Master's degree; or a PhD with 3 years experience; or equivalent experience
  • Understanding of cybersecurity concepts, including hardware security (e.g. RFID tags, smartcards, IoT security mechanisms), software security, network/infrastructure security, cryptography, and security testing and verification
  • Hands-on use of TPM tools, libraries (e.g., tpm2-tss), and integration strategies (e.g., secure/measured boot, remote attestation protocols, firmware validation)
  • Familiarity with security protocols and technologies such as PKI, HSM, public key cryptography, TCP/IP, SSL/TLS, and network security
  • Hands-on embedded software development experience in C/C++; experience with Yocto Linux and real time operating systems (QNX) is a plus
  • Experience with scripting languages and Linux (Python, Bash, Shell; familiarity with PowerShell)
  • Capable of conducting security analysis, threat modeling, and cybersecurity risk assessments for products and services
  • Proficiency in secure coding practices, code analysis, and secure software development lifecycle (SDLC) principles
  • Ability to support cross-functional teams and third-party vendors in addressing security concerns and compliance with security laws and regulations

Responsibilities

  • Design, develop, and implement product security features, mitigations, and tools
  • Perform security testing and verification, including development and execution of test cases and protocols
  • Triage, analyze, and investigate product security issues and vulnerabilities
  • Conduct security reviews including architecture reviews, code reviews, and vulnerability assessments
  • Prepare and communicate real-time security status updates and report to key stakeholders
  • Stay current with evolving security threats, technologies, and best practices through formal and self-directed learning
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service