Help Apple secure the world’s most advanced consumer devices which people trust to store their personal and professional data. We believe that the best defense is a good offense, and that that means finding vulnerabilities before the community does. We're looking for dedicated and inspired individuals to join our team and attack Apple's products, with the goal of better safeguarding our users. The job involves performing security reviews of low level software and hardware, side channel and fault... more details
Help Apple secure the world’s most advanced consumer devices which people trust to store their personal and professional data. We believe that the best defense is a good offense, and that that means finding vulnerabilities before the community does. We're looking for dedicated and inspired individuals to join our team and attack Apple's products, with the goal of better safeguarding our users. The job involves performing security reviews of low level software and hardware, side channel and fault attacks on SoC hardware, and research into advanced physical attacks.
Ability to find software security vulnerabilities through static and dynamic analysis Programming background in C, C++, PythonGood understanding of SoC architecture and hardware security primitivesFamiliarity with assembly and ARM instruction setAn understanding of past, current, and emerging security exploit typesFamiliarity with secure bootloadersTeam player with good interpersonal skills
Customers’ security, privacy, and safety are very important to Apple. Your job will be to analyze our products and attempt to break them in ways that could undermine these goals, including when the attacker is in possession of the Apple device. In order to do that, you will be required to:- Examine embedded systems and find security vulnerabilities in Apple or 3rd party firmware and bootloaders. Develop tools to automate or focus the effort of performing such security reviews- Examine new Apple silicon security features and demonstrate if/how they can be defeated- Perform physical attacks on hardware in a lab environment- Propose new ideas for security hardening and mitigations- Stay abreast of modern hacking techniques against Apple products, including those where the attacker is in close proximity or possession of the device
- Proficiency in real time operating system internals- Experience with side channel analysis (SCA) and fault injection (FI) attacks- Ability to work in a lab environment with some familiarity with standard electronics equipment- Good understanding of the principles and use of cryptographic primitives and protocols- Reverse engineering capabilities + working knowledge in IDA
Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.
We would like to take a second to Welcome You to Job Abstracts, the nation’s largest Pure Job Board. With over 3.1 million job listings from 15,000+ Companies & Organizations, we help job searchers find careers that match their interests. As an anonymous user, you have probably discovered how easy our system is to use. However, you have just scratched the surface of what we can offer.
We encourage you to Register so you can use our most powerful features: searching with multiple terms, setting up multiple locations, establishing favorite companies, and accessing your search history. If you find a job you like, you can apply directly for it, and then, keep notes on it. We will also keep a lookout for jobs that match your search terms and email you when we find something you may like.
You can register for free and the system is free to use. If you like our system so far, click on Register and unlock the power required by serious job searchers.
Any time you conduct a search, the system shows you job matches, ranked by their Relevance Score (RS).
The score is calculated by a proprietary algorithm that uses Intelligent Machine Learning.
The Relevance Score tells you how well the job opportunity matches your search term or terms.
When not logged in, the system is limited to one search term. Scores for single term matches are usually lower.
When you register, log in, and set up multiple terms prioritized by importance, the jobs found for you will receive a much higher Relevance Score.