Negotiable
Undetermined
Remote
City of London, London
Summary: The Hardware Security Engineer role focuses on evaluating CPU vendor-reported vulnerabilities and providing mitigation recommendations within the Information Security Engineering team. This position requires specialized knowledge in CPU microarchitectural security and involves hands-on research experience. The work is primarily remote and resembles PhD-level experimental research rather than general security engineering. The role is based in London and is expected to last for 9 months.
Key Responsibilities:
- Evaluate CPU vendor-reported vulnerabilities and assess their impact.
- Provide mitigation recommendations for identified vulnerabilities.
- Conduct hands-on research related to microarchitectural security.
- Discover new microarchitectural attacks.
- Collaborate with engineering teams to implement production-grade mitigations.
Key Skills:
- Deep understanding of speculative execution and microarchitectural security.
- Hands-on research experience (PhD-level research counts as relevant experience).
- Experience discovering new microarchitectural attacks.
- Acknowledgement from CPU vendors for responsibly disclosing hardware vulnerabilities.
- Publications in reputable security venues.
- Strong experimental/research methodology skills.
Salary (Rate): undetermined
City: London
Country: United Kingdom
Working Arrangements: remote
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
Job Title : Hardware Security Engineer
Location : London (Remote)
Duration : 9 Months
Mode : Remote
Role Overview
The team within Information Security Engineering (based primarily in Zurich, with members in Poland) evaluates CPU vendor-reported vulnerabilities, assesses their impact , and provides mitigation recommendations. The work is highly specialized and focused on CPU microarchitectural security (including RAM and GPUs).
Candidate Profile - Key Signals
Non-negotiable / Strong Signals:
- Deep understanding of speculative execution and microarchitectural security.
- Hands-on research experience (PhD-level research counts as relevant experience).
- Experience discovering new microarchitectural attacks.
- Acknowledgement from CPU vendors for responsibly disclosing hardware vulnerabilities.
- Publications in reputable security venues.
Valuable but Slightly Flexible:
- Implementing production-grade mitigations.
- Ability to unblock other engineering teams.
- Strong experimental/research methodology skills.
The work closely resembles PhD-level experimental research rather than general security engineering.