
SECURITY MANAGER
- София
- Permanent
- Full-time
- Analyze internal and Customer specifications.
- Participate in Customer discussions and meetings.
- Product security concept/architecture development withing the given frames and state of the art.
- Risk evaluation/assessment pre- and post-production of the product.
- Coordinating security topics with SW, System and Validation & Verification teams.
- Collaborate with product/solutions departments to identify and/or develop secure solutions.
- Feasibility analysis and risk assessment of proposed solutions/fixes in an embedded system environment
- Networking with Architects/Experts community towards Cyber Security implementation
- Consulting for Security aspects in design and process issues throughout the product design, development, and post-launch phases
- Conducting research and development activities to further support company and departmental initiatives
- Interfacing and collaborating with cross-functional teams to organize Security Boot camps org wide to improve cyber security mindset ratio.
- Be part of the security group's center of competence. Contributing with security knowhow and related process and technical improvements.
- Experience in the security aspects of multiple platforms, operating systems, software, communications, and network protocols
- Feasibility analysis and risk assessment of proposed solutions/fixes in an embedded system environment
- Embedded systems architecture understanding to perform a detailed analysis of software and hardware features to secure embedded devices.
- Experience with cross team feature management (tracking, consulting, and evaluating security features).
- Ability to prepare detailed plan and following/guiding teams through different standards and processes concerning security.
- Experience with management level reporting and feature tracking.
- SW development experience in embedded C/C++
- Expertise in Secure System Architecture for Products and Solutions (Hardware & Software)
- Knowledge of system life cycle management principles, including software security and usability
- Well aware of Vulnerability assessment, static/dynamic code analysis, fuzzing, penetration testing, cryptographic algorithms and implementation or security research
- Aware of Penetration Testing - Hardware, Embedded Systems, Operating Systems, Network Equipment, Wireless, Mobile, Databases Hacking and/or reverse engineering
- Tools - Proxies, Port Scanners, Vulnerability Scanners, Exploit Frameworks (ex: Burp, Nessus, Nmap, Metasploit)
- Development environments for embedded systems- cross-compilation, debug tools, ICE, JTAG etc.
- Trust Zone, Trusted Computing Group, Trusted Platform Module, Trusted Execution Environment
- Knowledge on AUTOSAR/AUTOSAR security modules