NVIDIA is looking for a technical lead in identifying, developing, and growing offensive security practices and tools; with a focus on our production GPU kernel driver and embedded software. You should be able to demonstrate the ability to excel in an environment with complex software and hardware designs.
What you'll be doing:
- Forecasting and identifying vulnerabilities in our production kernel and embedded software, building proof of concepts, and working with development teams to remediate
- You will evaluate, recommend, and develop improvements to current tools and practices as security testing with an eye to offensive practices (Penetration testing, injection, fuzzing and abuse related attack models)
- Evangelize and drive adoption of new or improved tools, practices, and plans to increase product robustness and reliability
What we need to see:
- Proven security experience in either a forensic or an offensive security focused role
- Consistently demonstrates focus on continuous improvement driving resolutions through closed-loop actions
- Effective written and verbal communication regardless of audience or issue complexity
- Ability to work collaboratively and remotely with others to accomplish complex goals
- Requires BS/BA degree or equivalent industry experience and 6+ years in the Software development or Security related field
- Excellent C programming and low-level driver experience.
- You are an asset if you have familiarity with computer system architecture, microprocessor, and microcontroller fundamentals (caches, buses, memory controllers, dma, etc)
- Kernel experience with Linux, Android, Chrome, or Windows systems.
Ways to stand out from the crowd:
- Experience with System reversing and exploitation
- Experience with microarchitectural attacks (side channels, fault injection, etc)
- Experience with secure code quality practices and tooling to support quick engagements and rapid analysis - static analysis tools (Coverity, Checkmarx, or similar), dynamic scanning (Rapid 7, AppSider, or similar), Fuzzing (AFL, Peach, or similar) and code coverage (Bullseye, LDRA, etc)
- Experience with penetration techniques and tools