-
Senior Offensive Security Engineer - Embedded…
- Silvus Technologies (Los Angeles, CA)
-
THE COMPANY
**Silvus Technologies** is dedicated to one mission: connecting those who keep us safe. We do so by delivering the most advanced Mobile Ad-hoc Network (MANET) radios powered by our custom and ever evolving Mobile-Networked MIMO waveform. Together, our radios and waveform provide the vital communications for mission critical applications in the harshest environments from underground tunnels to high altitude balloons.
Silvus StreamCaster® radios are being rapidly adopted by customers all over the world ranging from the U.S. and Allied Nations Departments of Defense, to International, Federal, State and Local Law Enforcement agencies, all the way to the Superbowl, Grammys and industry-leading drone, robot, and other unmanned systems manufacturers.
Wouldn’t you like to join an incredibly talented group of people, doing very challenging work, with the prime directive of **“Keeping Our Heroes Connected (https://www.youtube.com/watch?v=VCJ-amP0GLc) ”?**
Silvus’ rapid growth is fueled by a focus on research and innovation and a team of the most passionate, skilled, and creative thinking individuals. If you are looking for a challenging experience, you owe it to yourself to learn how Silvus can provide a rewarding internship that creates a pathway to a fulfilling career.
THE OPPORTUNITY
Silvus is seeking a **_Senior Offensive Security Engineer – Embedded Systems_** who will report to the _Director of Software Engineering_ on the Software Engineering team. The successful individual in this role will focus on proactively identifying and exploiting vulnerabilities in embedded systems (hardware, firmware, and associated software) to improve overall security posture and will use techniques like penetration testing, reverse engineering, and threat modeling to find weaknesses in system design and architecture.
This position is based at Silvus Technologies’ headquarters in the heart of vibrant **West Los Angeles,** **CA** and is on a hybrid schedule; a minimum of 3 days onsite per week is expected. On-site days are Mondays, Wednesdays, and Thursdays.
The following is a list of at least some of the current essential job functions of the position. Management may assign or reassign duties and responsibilities at any time at its discretion.
ROLE AND RESPONSIBILITIES
+ Conduct penetration testing and vulnerability assessments on embedded systems, focusing on MAC (Medium Access Control) and mobile ad-hoc networking protocols.
+ Design and execute adversarial testing for product performance, reliability, and resilience against attacks.
+ Exploit and secure device drivers and board support packages for ARM and RISC-V based systems.
+ Customize and harden Linux systems, including scripting for automated security testing and exploit development.
+ Develop and exploit network management software and web interfaces to identify and mitigate security flaws.
+ Implement and attack security protocols and encryption algorithms to uncover weaknesses in embedded devices.
+ Perform security analysis on audio streaming and push-to-talk voice applications to ensure robust protection against threats.
+ Evaluate and enhance product security to meet regulatory standards like NIST FIPS 140-3 and NIAP Common Criteria through offensive security techniques.
REQUIRED QUALIFICATIONS
+ Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field (e.g., Mathematics, Computer Engineering).
+ Minimum 5 years of experience in cybersecurity, with at least 2 years in offensive security roles (e.g., penetration testing, red teaming, vulnerability assessment).
+ Hands-on experience with exploit development, adversary simulation, or purple teaming
+ Proficiency in penetration testing methodologies and/or tools (e.g., Metasploit, Burp Suite, Cobalt Strike, Nmap, etc.).
+ Expertise in network protocols (TCP/IP), secure network architectures, or web vulnerabilities (e.g., OWASP Top 10, etc.).
+ Coding/scripting in Python, Bash, C/C++, or PowerShell for custom tools or exploit development.
+ **Security Clearance: Active U.S. Government SECRET clearance or the ability to obtain one within 12 months of hire.**
+ **NOTE - Must be a U.S. Person (U.S. Citizen, or U.S. Permanent Resident) due to clients under U.S. federal contracts**
PREFERRED KNOWLEDGE, SKILLS AND ABILITIES
+ Master’s degree in Cybersecurity, Computer Science, Information Technology, or a related field (e.g., Mathematics, Computer Engineering).
+ Knowledge of reverse engineering, malware analysis, and fuzzing techniques.
+ Familiarity with cloud security (e.g., AWS, Azure) and containerized environments (Docker, Kubernetes).
+ At least one or more of the following certifications:
+ Offensive Security Certified Professional (OSCP): Gold standard for penetration testing, validating hands-on skills.
+ Certified Ethical Hacker (CEH): Covers attack methodologies, requires IT security experience.
+ GIAC Penetration Tester (GPEN) or GIAC Exploit Researcher and Advanced Penetration Tester (GXPN): Advanced offensive security skills.
+ Certified Information Systems Security Professional (CISSP): For senior roles, requiring 5+ years in cybersecurity domains.
+ CompTIA PenTest+: Demonstrates penetration testing and vulnerability assessment skills.
+ Critical thinking and problem-solving for complex attack scenarios.
+ Strong communication to explain vulnerabilities to technical and non-technical stakeholders.
+ Collaboration with blue teams, developers, and leadership for purple team exercises.
WORKING CONDITIONS & PHYSICAL REQUIREMENTS
+ Office environment.
+ While performing the duties of this job, the employee is required to do the following:
+ Lift equipment up to 20 lbs. for the set-up of demonstrations and testing.
+ Perform bending and reaching movements to place items on lower and higher shelves.
+ Walking/Moving in the labs.
COMPENSATION
_The pay range is NOT a guarantee. It is based on market research and peer data, and will vary depending on the candidate’s experience and qualifications._
CA Pay Range
$140,000—$200,000 USD
NOTE - As a U.S. Federal Contractor, Silvus Technologies requires that ALL candidates being considered for employment for any position (regardless of level) MUST be a U.S. Person (permanent resident or citizen). Stricter U.S. Citizen ONLY requirements are needed for some Engineering or R&D roles. This generally does NOT apply to International positions; only job postings for positions located in the U.S. Exceptions will be included in the Required Qualifications section of the posted position.
_All Employment is contingent upon the successful clearance of a background check._
Silvus is proud to be an equal-opportunity employer, and we value diversity. We do not discriminate on the basis of race, color, age, religion or belief, ancestry, national origin, sex (including pregnancy), sexual orientation, gender identity and/or expression, marital, civil union or domestic partnership status, physical or mental disability, protected veteran status, genetic information, political affiliation, or any other factor protected by applicable federal, state, or local laws.
We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive benefits and privileges of employment. Please contact us to request accommodation.
_*Silvus does not accept unsolicited resumes from individual recruiters or third-party recruiting agencies in response to job postings. No fee will be paid to third parties who submit unsolicited candidates directly to Silvus Technologies._
-
Recent Jobs
-
Senior Offensive Security Engineer - Embedded Systems
- Silvus Technologies (Los Angeles, CA)
-
Python/AWS Senior Lead Software Engineer
- JPMorgan Chase (Columbus, OH)