Our team focuses on security improvements for Apples various platforms and the hardware that supports them as well as building security tools to provide high assurance. We reverse engineer exploits provide insightful analysis implement innovative security features consult with other teams on both hardware and software audit code and review designs. We are seeking someone with strong technical expertise and a passionate desire to secure low-level systems by showing how they can be broken. Youll be working alongside teammates with diverse technical backgrounds including mobile and console research binary instrumentation SoC microarchitecture compiler development applied fault injection and more. If you have your own area of fascination and a love of low-level security youll find yourself right at home! In this role you will... - Provide hardware and firmware security design assistance - Audit security critical firmware and hardware. - Create tools that help automate security verification testing or research. - Reverse engineer exploits if necessary. - This position may require occasional travel to other Apple sites vendors and security conferences.
A proven track record in finding security vulnerabilities in shipping products and/or designing platform security countermeasures.
Programming background in C C and/or Objective-C. Additionally must have proficiency in scripting language(s) such as Python.
Proficiency with assembly languages ARM a big plus.
Familiarity with modern processor and SoC architecture.
Background in secure programming patterns and code auditing.
Have an understanding of past current and emerging security exploit classes.
Proficiency with operating system internals especially macOS iOS or other flavors of UNIX
Have the ability to track and lead multiple parallel projects.
Familiarity with collaborating with partner teams in hardware software and product groups to define and deliver rigorous security features
Relevant experience or education such as performing security research and analysis or a Bachelors degree in Computer Science or related field. We are open to strong candidates with no formal education.
Experience creating working proof of concepts from found vulnerabilities on systems with advanced countermeasures (ASLR TZ PAC etc).
Exposure to kernel or driver programming.
Reverse engineering using tools such as IDA Pro.
Familiarity with the principles and use of cryptographic primitives and protocols.
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.