Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailNot Disclosed
Salary Not Disclosed
1 Vacancy
Were a specialized cybersecurity team working on safety-critical automotive systems. Our expertise in reverse engineering complex platforms enables us to uncover vulnerabilities and analyze proprietary implementations. Our work spans the entire security lifecycle from early product design to verication. We design and build complete security solutions based on our research ndings automate security assessments and develop both offensive and defensive capabilities to establish robust security boundaries for critical systems. Our team works directly with manufacturers translating security requirements into concrete implementations while guiding architecture decisions against realistic threats.
Reverse engineer custom security solutions to identify weaknesses
Build custom offensive and defensive tools to aid in research
Reverse engineer design and implement security solutions from the ground up
Consult on product designs translating security requirements into concrete implementations
Work directly with clients guiding security architecture decisions
Transform theoretical security concepts into practical implementations that protect critical systems
Our work spans several demanding technical domains:
RF / Wireless Signals Analysis: Researching secure communication protocols and wireless implementations
Vulnerability Research: Discovering security issues through systematic investigation and creating effective mitigations
Security Tool Development: Building specialized offensive and defensive tools that both attack and protect critical systems
Advanced Analytics: Creating analytical frameworks that process security-relevant data at scale
Architecture Assessment: Designing secure system architectures and evaluating security across integrated components
Firmware Security: Researching secure rmware architectures and validating existing implementations to ensure security boundaries
Hardware Analysis: Analysis of secure hardware designs and identifying weaknesses in physical components
This challenging work demands technical precision creative problem-solving and security engineering from first principles. Our cybersecurity team includes specialists who can both build and break complex systems.
Design and build security solutions that protect critical automotive systems
Work from rst principles to create both offensive and defensive security capabilities
Build meaningful client relationships with major manufacturers
Work with cutting-edge equipment and computing resources
Develop professionally through challenging projects and knowledge sharing
Enjoy work exibility with balanced scheduling options
Collaborate in our modern Eindhoven ofce with dedicated labs
Join an international team (Hallo! Hoi! ! Hola! ! ر!)
You are either a skilled reverse engineer or a developer who thrives working alongside reverse engineers. You have strong skills in either system security assessment or secure development with interest in growing across both domains. You might excel at nding vulnerabilities through reverse engineering or at building secure implementations and tooling. You take initiative on problems within your expertise while collaborating on challenges outside it. You communicate technical concepts effectively and appreciate the importance of teamwork in security research. You approach your work with appropriate care recognizing the safety implications of automotive systems. We dont expect mastery of every skill were looking for specialists who want to learn and contribute to a balanced security team.
Experience with reverse engineering or software development in at least one compiled language that produces native machine code (C/C Rust Go etc.)
Demonstrated technical writing skills for detailed documentation of architecture ndings and methodologies
Technical curiosity and methodical investigation skills
Skills in reverse engineering complex systems with minimal documentation
Analytical approach to nding technical weaknesses
Ability to explain technical concepts clearly to different audiences
Risk analysis and application of technical regulations to technical architecture
Public speaking and technical knowledge sharing
Advanced development skills such as: Linux primitives Big-data Binary protocol manipulation etc.
At NavInfo Europe (NIE) based in the innovative Brainport Eindhoven region we pioneer automotive cybersecurity AI-driven data compliance and advanced navigation solutions. As part of NavInfos global ambition to become the digital brain behind intelligent driving our European team specializes in:
Cybersecurity Services: Reverse engineering vulnerability discovery and security tooling.
AI and Compliance: Cutting-edge anonymization methods GDPR compliance and smart data curation.
Navigation Data Innovation: Precision mapping and data-driven mobility insights.
We continuously evolve our services striving for faster delivery higher quality and innovative security standards that directly impact global mobility.
Innovation-first Environment: Be at the forefront of technologies shaping secure and intelligent mobility solutions.
Continuous Growth: Expand your expertise with diverse challenges and professional development opportunities.
Collaborative & Diverse Team: Join an international and collaborative team driven by technical excellence.
Attractive Benefits: Enjoy competitive compensation and flexible working arrangements tailored to support your personal and professional growth.
Are you driven by securing tomorrows mobility Then we like to get to know you!
To apply please submit the following:
CV/resume
Cover letter explaining*:
Your interest in safety-critical security
The type of position you envision based on your technical background
How your specic skills would add value to our technical domains
Sample from your portfolio demonstrating relevant technical skills.
*Unfortunatelywecannotprocessyourapplicationwithoutacoverletterandasampleofyourportfolio.
Applications are reviewed regularly. You can expect to hear from us within 3 business days. Promising candidates will be invited to discuss potential opportunities and might be asked to perform a hacking challenge.
If you have any questions regarding this (open) vacancy or your application status please contact Rob Lepsi via email at
** Unsolicited services or offers from recruitment agencies or intermediaries will not be responded to!
Your application has been successfully submitted!
Full-Time