Firmware Security Engineer

San Mateo, California

Applications have closed

Verkada

Imagine all your building and security products on a single cloud-managed platform, accessible from anywhere in the world. Free 30-day trial. Simple, secure and scalable.

View company page

About VerkadaAt Verkada, we’re rethinking what it means to be physically safe. Today, we build security cameras that detect action, identify danger and help keep people and places safe and secure. Using a combination of software and hardware, we’re transforming an industry that has seen little innovation for decades—and we already support thousands of customers. But this is just the beginning. We envision a world in which security systems feel as seamless and modern as the organizations they protect and our enterprise solution becomes a model for not just business security, but public security as well.

You will:

  • Facilitate the security of the hardware and firmware that goes onto the devices we ship to our customers: Verkada cameras, Verkada Access Control units, Verkada Card / BLE readers, and future devices we will soon be launching
  • Explore innovative solutions to enable Verkada business instead of “Security says No”
  • Partner closely with Product, Hardware, and Backend engineering to test and improve the security of Verkada’s products and exceed customers’ expectations
  • Set up security tooling to ensure secure coding best practices
  • Triage and recommend solutions for security bugs from tools, third party assessments and bug bounties
  • Participate in code reviews and pull requests
  • Collaborate with other engineering leaders to define, communicate, and execute on goals, priorities and process.
  • Collaborate with the CISO and security team to grow the broader Verkada security program
  • Share your security experience with other teams internally and externally via security conferences and blogs
  • Help your peer engineers grow their own security reasoning and knowledge

Requirements:

  • Bachelor of Science in Computer Science degree or equivalent
  • Experience in embedded firmware environments
  • 5+ years of experience as a security engineer, software engineer, or security consultant
  • Understanding of security weaknesses, exploits, attacks and mitigations
  • Coding ability - you will be writing production code
  • Excellent collaborative skills
  • Outstanding written and verbal communication
  • Experience with most of the following: C/C+, Device Drivers, Kernel, Fuzzing, Network protocols, Static Analysis, OS hardening, Threat Modeling

Nice to have:

  • Experience programming in Go and Python
  • Achieved FIPS 140-2 or FIPS 140-3 certification
  • Knowledge of FreeRTOS and Embedded Linux
  • Experience with TPMs and/ or SecureBoot
  • Cryptography primitives, protocols and applications
About our teamBehind the scenes, we’re a team of computer scientists, hardware engineers and experienced founders who saw a chance to make a real impact. We’re united by the challenge of building beautiful products, designed for real people—and by our commitment to using technology responsibly. We believe keeping data private and secure is core to our safety as individuals, businesses and communities and we put great care into building systems that embody our values as people. Likewise, many of Silicon Valley’s top investors believe in us: we’re backed by Sequoia Capital, FirstRound, Meritech and Siemens (Next47).
Verkada is an equal opportunity employer and value diversity at our company. We do not discriminate on the basis of race, religion, color, national origin, gender, sexual orientation, age, marital status, veteran status, or disability status, and encourage all qualified applicants to apply.

Tags: C C++ Computer Science Cryptography Exploits FIPS 140-2 Linux Python

Perks/benefits: Career development Conferences

Region: North America
Country: United States
Job stats:  7  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.