Job Description for Embedded Cybersecurity Expert We are seeking an experienced Embedded Cyber Security Expert with a minimum of 5+ years of experience to join our team. In this role, you will be responsible for designing, implementing, and maintaining security solutions for embedded systems, ensuring protection against evolving cyber threats. You will work closely with cross-functional teams to integrate security measures into embedded software and hardware, conduct risk assessments, and support compliance with industry standards and regulations. Embedded Cybersecurity Strategy & Implementation: Define and implement security best practices for Android-based embedded systems. Assess and mitigate security risks in bootloader, firmware, kernel, and application layers. Design and implement secure boot, encryption, and key management strategies. Ensure compliance with industry standards such as FIPS, NIST, ISO 27001, and OWASP. Secure Software Development & Hardening: Work on Linux kernel hardening, secure coding practices, and access control mechanisms. Implement SELinux policies, sandboxing techniques, and privilege management. Enhance the security of Android system services, HAL (Hardware Abstraction Layer), and drivers. Threat Modeling & Vulnerability Management: Perform threat modeling, security assessments, and penetration testing of the system. Identify, analyze, and remediate vulnerabilities in Android OS, firmware, and embedded software. Work with the security team to monitor, analyze, and respond to security incidents. Security Compliance & Certification Ensure compliance with GDPR, SOC 2, and other relevant cybersecurity regulations. Assist in obtaining security certifications for video conferencing products. Required Skills & Qualifications: Technical Skills 5+ years of experience in embedded cybersecurity, Android security, or firmware security. Strong knowledge of secure coding in C, C++. Experience with Android security architecture, TrustZone, and SE Linux. Familiarity with Android Verified Boot (AVB) and Trusted Execution Environments (TEE). Hands-on experience with cryptographic protocols, authentication mechanisms, and secure key storage. Experience with penetration testing tools. Strong analytical and problem-solving abilities. Ability to work cross-functionally with firmware, software, and security teams. Excellent written and verbal communication skills. Enterprise. Certifications such as CISSP, CEH, OSCP, or GSEC. Previous experience in video conferencing, AV systems, or consumer electronics security. RED Radio Equipment Directive18031-1 and 18031-2 ACM Access control mechanism AUM Authentication mechanism SUM Secure update mechanism SSM Secure storage mechanism SCM Secure communication mechanism LGM Logging mechanism DLM Deletion mechanism UNM User notification mechanism CCK Confidential cryptography keys,
Employement Category:
Employement Type: Full timeIndustry: IT Services & ConsultingRole Category: Not SpecifiedFunctional Area: Not SpecifiedRole/Responsibilies: Security Expert Job in Maganti IT Resources,
Contact Details:
Company: Maganti IT ResourcesLocation(s): Hyderabad