Social network you want to login/join with:
Hardware Cyber Security Researcher, Reading
Client: Oracle
Location: Reading, United Kingdom
Job Category: Other
EU work permit required: Yes
Job Reference: 6ab646f3fe41
Job Views: 8
Posted: 26.04.2025
Expiry Date: 10.06.2025
Job Description:
The EHT operates across Oracle's product portfolio to enhance security within the engineering teams. As an EHT member, you will be involved in product security assessments, from identification to fixing vulnerabilities. We value individual contribution and support learning and growth. Our goal is to share knowledge and strengthen the team through individual development.
Responsibilities:
* Conduct hardware security assessments to identify and report vulnerabilities, providing guidance for fixes.
* Deep dive into hardware implementations, reverse engineer firmware, file formats, and protocols to find subtle security flaws.
* Develop proof-of-concept exploits to simulate real-world attack scenarios.
* Share knowledge and collaborate with team members to improve security standards.
Requirements:
* Bachelor's degree in Electrical/Electronic/Computer Engineering, Computer Science, or related field.
* 3+ years experience in vulnerability research or bug hunting; previous vulnerability disclosures (CVEs, blog posts) are a plus.
* Practical experience with hardware attacks, such as side channels and fault injections; familiarity with hardware attack tools like ChipWhisperer is desirable.
* Ability to think like an adversary, identify vulnerabilities, assess risks, and communicate findings effectively.
* Knowledge of analogue and digital electronics, understanding complex schematics.
* Experience with embedded interfaces such as JTAG, SPI, I2C, RS232, USB, etc.
* Proficiency in building prototypes using Arduino/Raspberry Pi or similar platforms.
* Experience with hardware lab tools: soldering irons, logic analyzers, oscilloscopes, etc.
* Understanding of x86 and/or ARM architecture and assembly language.
* Experience with disassemblers and firmware reversing tools like IDA Pro, Ghidra, Radare, objdump, gdb, binwalk.
* Familiarity with memory corruption bugs and Linux OS internals.
* Fluency in C or C++, and proficiency in Python, Go, Java, or Bash; ability to learn new languages independently.
* Strong organizational and communication skills.
* Willingness to work physically in the Hardware Lab in Reading, approximately 50% of the time.
#J-18808-Ljbffr