Careers | Ubiwhere

loading

0%

Bleeding Edge Technologies

with custom Research and Development

Marketers

Icon

Security Consultant

Are you ready to tackle some of the technology’s greatest challenges?

We are recruiting a Security Consultant.

Apply now

arrow

A day as a Security Consultant:

  • Implementing, testing and operating advanced software security techniques in compliance with technical reference architecture
  • Performing on-going security testing and code review to improve software security
  • Troubleshooting and debugging issues that arise

 

Our Promise

  • Work in a casual but exciting and motivational atmosphere;
  • Integration into R&D from an Engineering perspective and the opportunity of developing skills related to technology transfer;
  • Remuneration compatible with experience;
  • Social benefits such as Health Insurance;
  • Full support to disseminate results of the work, including patenting and technology transfer;
  • Stability in a growing company.

Your out-of-the-box skills

  • A software security specialist with at least 5-10 years of practical experience of hardening networked software solutions in both embedded and server environments. Ideally associated with an organisation which can offer a range of testing and verification services.
  • Strong understanding and in-depth technical knowledge of security engineering, computer and network security, authentication, and security protocols and applied cryptography
  • Good knowledge of the security threat landscape and a deep understanding of common vulnerabilities, exploits and defence patterns
  • Good understanding of cryptography hardware, key management, and certificate management.
  • Knowledge of secure boot mechanism and chain-of-trust and trusted platform technology
  • Good practical understanding of software security including software image signing and the software update procedure
  • Experience in running security programs, including but not limited to penetration testing and vulnerability scanning
  • Understanding of threats relating to consumer and public internet environment deployments
  • Knowledge of business procedure and process security
 
 

Email

Call

Map