Senior Hardware Security Researcher
Date: 28 Mar 2026
Location: AE
Company: Technology Innovation Institute
Job Title: Senior Hardware Security Researcher
Key Responsibilities
· Conduct hardware and firmware security assessments, combining physical and logical attack techniques to identify and exploit vulnerabilities.
· Perform memory extraction from Flash, EEPROM, NOR/NAND, or other storage devices.
· Reverse engineer firmware and binaries using tools such as Ghidra, IDA Pro, Binary Ninja, or radare2 to uncover security weaknesses.
· Implement and automate custom test benches and toolchains for HW/SW analysis.
· Execute and analyse side-channel attacks (CPA, DPA, EM, timing, TVLA) and fault injection campaigns (voltage glitching, EMFI, laser) on embedded targets.
· Analyse secure boot, cryptographic primitives, and firmware protection mechanisms to identify design and implementation weaknesses.
· Interface with embedded systems through JTAG, SWD, UART, SPI, and similar debug or communication protocols.
· Deliver clear, well-documented technical reports.
Required Qualifications
· At least 5 years of experience of hands-on experience in hardware or embedded system security, covering both physical and logical attack surfaces.
· Proven experience performing firmware extraction and analysis (memory dumping, patching, and reconstruction).
· Experience with side-channel analysis and/or fault injection (voltage glitching, EMFI, laser, etc.), and commercial platforms, such as ChipWhisperer or/and Riscure Inspector.
· Strong understanding of applied cryptography, secure protocol design, and embedded crypto implementations.
· Experience with embedded systems (ARM Cortex-M, RISC-V, STM32, etc.) and debugging interfaces (JTAG, SWD, UART, SPI).
· Advanced programming skills in Python, C, and assembly for hardware interfacing and comfortable working in Linux environments with build systems, cross-compilation, and version control (git).
· Solid knowledge of lab instrumentation: oscilloscopes, logic analyzers, pulse generators, etc, as well as reverse engineering tools and techniques (Ghidra, IDA Pro, Binary Ninja, radare2, ARM/RISC-V disassembly).