As a Principal Security Firmware Engineer, you will lead the design and implementation of security-critical firmware for advanced AI compute systems. Your work will center on creating resilient low-level software that enforces trust from the silicon level upward, ensuring integrity through secure boot sequences, authenticated firmware updates, and hardware-backed security primitives.
Key Responsibilities
- Architect and implement firmware solutions that enforce secure boot, trusted execution, and hardware-rooted identity.
- Develop and harden firmware components against tampering, reverse engineering, and fault injection attacks.
- Define security requirements and threat models for embedded firmware across the product stack.
- Integrate cryptographic libraries and hardware security modules, including TPMs and HSMs, into low-level software environments.
- Conduct security reviews, code audits, and vulnerability assessments to ensure firmware resilience.
- Apply fuzz testing, penetration testing, and static analysis to uncover and resolve security flaws.
- Work closely with hardware engineering to enable chip-level security features and trusted execution environments.
- Ensure compliance with standards such as FIPS, NIST guidelines, and secure development best practices.
Qualifications
Applicants should hold a degree in Computer Engineering, Computer Science, Electrical Engineering, or a related field, along with 5–10 years of hands-on experience in embedded systems or firmware development. Proficiency in C and C++ is essential, along with deep knowledge of secure boot architectures, cryptographic protocols, and firmware security lifecycle management.
Experience with embedded operating systems like FreeRTOS, Zephyr, or Linux is required. Familiarity with secure update mechanisms and cryptographic key lifecycle management is critical.
Preferred Experience
- Programming in Rust for systems-level applications.
- Integration of TPM or HSM technologies into firmware stacks.
- Use of static analysis tools such as Coverity for security validation.
- Understanding of secure silicon design principles and trusted execution environments.
- Contributions to open-source firmware or security-focused projects.
Work Environment
The role supports a flexible interview process with accommodations available upon request. You’ll join a culture that values diverse perspectives, continuous learning, and innovation. The company is committed to fostering an inclusive workplace and upholding equal opportunity for all candidates and employees.