Help Apple secure the world’s most advanced consumer devices which people trust to store their personal and professional data. We believe that the best defense is a good offense, and that that means finding vulnerabilities before the community does. We're looking for dedicated and inspired individuals to join our team and attack Apple's products, with the goal of better safeguarding our users. The job involves performing security reviews of low level software and hardware, side channel and fault attacks on SoC hardware, and research into advanced physical attacks.
Ability to find software security vulnerabilities through static and dynamic analysis
Programming background in C, C++, Python
Good understanding of SoC architecture and hardware security primitives
Familiarity with assembly and ARM instruction set
An understanding of past, current, and emerging security exploit types
Familiarity with secure bootloaders
Team player with good interpersonal skills
Customers’ security, privacy, and safety are very important to Apple. Your job will be to analyze our products and attempt to break them in ways that could undermine these goals, including when the attacker is in possession of the Apple device. In order to do that, you will be required to:
- Examine embedded systems and find security vulnerabilities in Apple or 3rd party firmware and bootloaders. Develop tools to automate or focus the effort of performing such security reviews
- Examine new Apple silicon security features and demonstrate if/how they can be defeated
- Perform physical attacks on hardware in a lab environment
- Propose new ideas for security hardening and mitigations
- Stay abreast of modern hacking techniques against Apple products, including those where the attacker is in close proximity or possession of the device
- Proficiency in real time operating system internals
- Experience with side channel analysis (SCA) and fault injection (FI) attacks
- Ability to work in a lab environment with some familiarity with standard electronics equipment
- Good understanding of the principles and use of cryptographic primitives and protocols
- Reverse engineering capabilities + working knowledge in IDA