HamburgerMenu
hirist

Job Description

Job Title : Senior Firmware Vulnerability Management Engineer.


Location : Remote (Pan India).


Experience : 10 to 13 Years.


Job Type : Full-time / Permanent.


About the Role :


We are seeking a highly experienced Senior Firmware Vulnerability Management Engineer to lead advanced security assessments and hardening initiatives across embedded and firmware-based platforms.


This role demands strong expertise in reverse engineering, vulnerability management, and a deep understanding of firmware-level security in complex hardware environments.


Key Responsibilities :


- Own and drive the end-to-end firmware vulnerability lifecycle identification, analysis, prioritization, smitigation, and reporting.


- Reverse engineer firmware binaries to uncover potential vulnerabilities, backdoors, and insecure implementations.


- Perform static and dynamic analysis using tools such as IDA Pro, Ghidra, Binwalk, QEMU, etc.


- Extract and analyze firmware via interfaces like JTAG, UART, SPI, and others.


- Work collaboratively with software, hardware, and product security teams to embed secure coding and secure boot principles into the firmware.


- Develop scripts and automation to streamline firmware scanning, CVE correlation, and vulnerability tracking.


- Stay ahead of the curve on zero-day threats, CVEs, and exploit techniques relevant to firmware and embedded systems.


- Provide technical leadership, mentoring, and recommendations on secure firmware design and architecture.


Required Skills :


- 10 to 13 years of experience in firmware vulnerability research, reverse engineering, or embedded system security.


- Deep understanding of firmware internals, embedded OS (Linux, RTOS), and architecture (ARM, MIPS, RISC-V, x86).


- Strong expertise in reverse engineering tools (IDA Pro, Ghidra, Radare2, Binwalk, etc.


- Proficient in C, Assembly, and scripting languages like Python/Bash.


- Hands-on experience with firmware dumping, debugging interfaces (JTAG/UART/SPI), and bus analyzers.


- Strong exposure to secure boot, code signing, encryption protocols, and firmware integrity validation.


- Experience working with CVE databases, security advisories, SBOM, and secure SDLC.


info-icon

Did you find something suspicious?