IoT Security Researcher

Security EngineerSecurity EngineerFull TimeRemote

Location

United States + 180 moreAll locations: United States, Canada, Brazil, Colombia, Argentina, Chile, Venezuela, Bolivarian Republic Of, Bolivia, Plurinational State Of, Ecuador, French Guiana, Guyana, Paraguay, Peru, Suriname, Uruguay, Mexico, Costa Rica, El Salvador, Guatemala, Honduras, Nicaragua, Panama, Dominican Republic, Puerto Rico, Bahamas, Guadeloupe, Haiti, Jamaica, Martinique, Montserrat, United Kingdom, Germany, France, Estonia, Portugal, Hungary, Poland, Ukraine, Romania, Bulgaria, Czech Republic, Slovakia, Belarus, Moldova, Republic Of, Sweden, Greece, Belgium, Italy, Ireland, Switzerland, Netherlands, Finland, Malta, Denmark, Lithuania, Croatia, Spain, Austria, Bosnia And Herzegovina, Iceland, Luxembourg, Macedonia, The Former Yugoslav Republic Of, Montenegro, Norway, Serbia, Slovenia, Albania, Cyprus, Latvia, Monaco, South Africa, Egypt, Algeria, Angola, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Cape Verde, Central African Republic, Chad, Congo, Côte D'ivoire, Congo, The Democratic Republic Of The, Equatorial Guinea, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Guinea, Guinea-bissau, Kenya, Lesotho, Liberia, Libyan Arab Jamahiriya, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mayotte, Morocco, Mozambique, Namibia, Niger, Nigeria, Réunion, Rwanda, Senegal, Seychelles, Sierra Leone, Somalia, Sudan, Swaziland, Tanzania, United Republic Of, Togo, Tunisia, Uganda, Zambia, Zimbabwe, Georgia, Turkey, Israel, United Arab Emirates, Armenia, Azerbaijan, Bahrain, Iraq, Jordan, Kuwait, Lebanon, Oman, Qatar, Saudi Arabia, Palestinian Territory, Occupied, Yemen, India, Japan, Philippines, Pakistan, Thailand, Singapore, Viet Nam, Taiwan, Province Of China, Indonesia, Cambodia, Lao People's Democratic Republic, Malaysia, Myanmar, Korea, Republic Of, China, Afghanistan, Bangladesh, Bhutan, Kazakhstan, Kyrgyzstan, Maldives, Mongolia, Nepal, Sri Lanka, Tajikistan, Turkmenistan, Uzbekistan, Australia, Papua New Guinea, Kiribati, Palau, French Polynesia, Tuvalu, New Zealand

Posted

4 days ago

Salary

Not specified

No structured requirement data.

Job Description

This description is a summary of our understanding of the job description. Click on 'Apply' button to find out more.

Role Description

Our client is seeking an IoT Security Researcher to conduct advanced vulnerability research on embedded systems and connected devices. The role focuses on identifying and analyzing security weaknesses in firmware, device operating systems, and IoT communication protocols. This position is suited for researchers who enjoy low-level analysis, firmware reverse engineering, and vulnerability discovery across embedded platforms.

You will work with a team of experienced security researchers performing hands-on analysis of real-world devices, developing proof-of-concept exploits, and advancing internal research capabilities.

Responsibilities

  • Conduct vulnerability research on IoT and embedded systems across multiple platforms and device types.
  • Perform firmware extraction, unpacking, and reverse engineering.
  • Analyze device firmware using static and dynamic analysis techniques.
  • Identify vulnerabilities in device operating systems, network services, and communication protocols.
  • Develop proof-of-concept exploits to demonstrate impact.
  • Interact with device hardware using debugging and extraction interfaces such as UART, JTAG, SPI, or SWD.
  • Analyze IoT network protocols and device communications.
  • Document research findings and communicate technical discoveries to internal teams.
  • Develop tools and automation to support ongoing research activities.

Qualifications

  • Experience in vulnerability research or reverse engineering.
  • Experience analyzing embedded systems, firmware, or IoT devices.
  • Proficiency with reverse engineering tools such as Ghidra, IDA Pro, or Binary Ninja.
  • Experience with Linux-based embedded environments.
  • Scripting ability with Python or similar languages.
  • Understanding of network protocols and embedded device architectures.
  • Strong analytical and problem-solving skills.

Requirements

  • Experience with hardware debugging or chip-level interfaces.
  • Familiarity with IoT protocols such as MQTT, BLE, Zigbee, or proprietary device protocols.
  • Experience with exploit development.
  • Public vulnerability research, CVEs, or conference presentations.
  • Participation in CTFs, bug bounty programs, or security research communities.

Job Requirements

  • Experience in vulnerability research or reverse engineering.
  • Experience analyzing embedded systems, firmware, or IoT devices.
  • Proficiency with reverse engineering tools such as Ghidra, IDA Pro, or Binary Ninja.
  • Experience with Linux-based embedded environments.
  • Scripting ability with Python or similar languages.
  • Understanding of network protocols and embedded device architectures.
  • Strong analytical and problem-solving skills.
  • Experience with hardware debugging or chip-level interfaces.
  • Familiarity with IoT protocols such as MQTT, BLE, Zigbee, or proprietary device protocols.
  • Experience with exploit development.
  • Public vulnerability research, CVEs, or conference presentations.
  • Participation in CTFs, bug bounty programs, or security research communities.

Related Categories

Related Job Pages

More Security Engineer Jobs

Senior Cloud & Identity Engineer

Jobgether

We use an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements. Our system identifies the top-fitting candidates, and this shortlist is then shared directly with the hiring company. The final decision and next steps (interviews, assessments) are managed by their internal team. We appreciate your interest and wish you the best! Data Privacy Notice: By submitting your application, you acknowledge that Jobgether will process your personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate interest and pre-contractual measures under applicable data protection laws (including GDPR). You may exercise your rights (access, rectification, erasure, objection) at any time. #LI-CL1 We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.

Security Engineer4 days ago
Full TimeRemote

This role is designed for a hands-on engineer who will lead and support secure, scalable cloud and identity solutions across enterprise platforms. You will work closely with architecture, security, and operations teams to design, deploy, and maintain identity systems, API integra...

IAMSSOSCIMRBACOAuth2OIDCSAMLJWTREST APIAWSAzureTerraformCloudFormationOktaEntra IDPingZero TrustInfrastructure as CodeCI/CD
United States
Full TimeRemoteTeam 1,154Since 2007

The Principal Technical Consultant (PTC) Identity Focused Security Architect is a hands-on delivery leader who designs and leads identity solution implementations in client environments. This role is not purely advisory. You will own identity workstreams end to end, driving archi...

Active DirectoryEntra IDMicrosoft IdentityIGASSOMFApasswordlessRBACABACPBACOktaPAMidentity architectureauthenticationauthorizationPowerShellPython
United States

Principal Product Security Architect

Lumen Technologies

Lumen connects the world. We are igniting business growth by connecting people, data and applications – quickly, securely, and effortlessly. Together, we are building a culture and company from the people up – committed to teamwork, trust and transparency. People power progress. We’re looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future. Background Screening If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. Equal Employment Opportunities We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training. Disclaimer The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.

Security Engineer4 days ago
Full TimeRemoteTeam 10,001

This senior technical leadership role is responsible for researching, designing, prototyping, and operationalizing advanced security solutions for Lumen’s Managed and Professional Security Services portfolio. The architect will drive innovation to create market-ready cybersecurity offerings supporting the end-to-end lifecycle from design through SOC operations.

Security architectureSOC operationsSIEMSOARMDRXDRNGFWVulnerability managementCASBSASEThreat intelligenceCloud securityAutomationOrchestrationNISTPCI-DSSHIPAACISSP
United States
$152K - $223K / year

Security Consultant

Tenable

Cloud Security | Operational Technology | Identity Security | and more

Security Engineer4 days ago
ContractRemoteTeam 1,001-5,000Since 2002H1B Sponsor

The Security Consultant plays a key role in implementing and enabling Tenable’s Exposure Management solutions to help organizations effectively manage and reduce cyber risks. This role onboards Tenable technologies, following industry standards and best practices, to deliver cust...

United States + 144 moreAll locations: United States, Canada, Brazil, Colombia, Argentina, Chile, Venezuela, Bolivarian Republic Of, Bolivia, Plurinational State Of, Ecuador, French Guiana, Guyana, Paraguay, Peru, Suriname, Uruguay, Mexico, Costa Rica, El Salvador, Guatemala, Honduras, Nicaragua, Panama, Dominican Republic, Puerto Rico, Bahamas, Guadeloupe, Haiti, Jamaica, Martinique, Montserrat, United Kingdom, Germany, France, Estonia, Portugal, Hungary, Poland, Ukraine, Romania, Bulgaria, Czech Republic, Slovakia, Belarus, Moldova, Republic Of, Sweden, Greece, Belgium, Italy, Ireland, Switzerland, Netherlands, Finland, Malta, Denmark, Lithuania, Croatia, Spain, Austria, Bosnia And Herzegovina, Iceland, Luxembourg, Macedonia, The Former Yugoslav Republic Of, Montenegro, Norway, Serbia, Slovenia, Albania, Cyprus, Latvia, Monaco, South Africa, Egypt, Algeria, Angola, Benin, Botswana, Burkina Faso, Burundi, Cameroon, Cape Verde, Central African Republic, Chad, Congo, Côte D'ivoire, Congo, The Democratic Republic Of The, Equatorial Guinea, Eritrea, Ethiopia, Gabon, Gambia, Ghana, Guinea, Guinea-bissau, Kenya, Lesotho, Liberia, Libyan Arab Jamahiriya, Madagascar, Malawi, Mali, Mauritania, Mauritius, Mayotte, Morocco, Mozambique, Namibia, Niger, Nigeria, Réunion, Rwanda, Senegal, Seychelles, Sierra Leone, Somalia, Sudan, Swaziland, Tanzania, United Republic Of, Togo, Tunisia, Uganda, Zambia, Zimbabwe, Georgia, Turkey, Israel, United Arab Emirates, Armenia, Azerbaijan, Bahrain, Iraq, Jordan, Kuwait, Lebanon, Oman, Qatar, Saudi Arabia, Palestinian Territory, Occupied, Yemen