Find your dream job faster with JobLogr
AI-powered job search, resume help, and more.
Try for Free
EndoSec LLC

EndoSec LLC

via Indeed

All our jobs are verified from trusted employers and sources. We connect to legitimate platforms only.

Hardware Security and Vulnerability Analyst - Remote

Anywhere
Full-time
Posted 2/3/2026
Verified Source
Key Skills:
Vulnerability Analysis
Firmware Extraction
Security Exploit Development

Compensation

Salary Range

$120K - 200K a year

Responsibilities

Analyze hardware and firmware for vulnerabilities, develop exploits, and document findings to improve security.

Requirements

Requires expertise in hardware security, reverse engineering, embedded systems, and programming in C/C++, Python, assembly, with the ability to perform side-channel and fault injection attacks.

Full Description

Hardware Security and Vulnerability Analyst - Remote • EndoSec LLC, • Remote • Preferred Skills: C/C++, Python, assembly, IDA Pro, Ghidra, FPGA, cryptography, hardware, embedded software, hardware security, reverse engineering, side channel attacks, fault injection • Travel required up to 20%. Full Time Must be able to apply for and maintain a U.S. Government Security Clearance Job Description The EndoSec Hardware Security and Vulnerability Analyst is responsible for extracting and analyzing firmware and data at rest, identifying vulnerabilities in software, firmware, and hardware, as well as developing proof of concept exploits. The candidate will collaborate with other engineers and security experts to find and exploit security flaws and vulnerabilities within devices and designs as well as to build secure and efficient systems, contributing to our products and services? ongoing security and privacy. This is a remote position. Key Responsibilities • System Analysis: Analyze systems to understand functionality, failure points, and consequences of failure. • Security Measure Circumvention: Bypass implemented security measures to gain access to sensitive data, including enabling debugging, forging or bypassing signatures, gaining elevated privileges, and simulating environmental and working conditions. • Binary Code Extraction and Analysis: Extract firmware, executables, and other sensitive data from embedded systems and analyze the extracted code for possible vulnerabilities and sensitive data, e.g. passwords, cryptographic keys, etc. • Side-Channel Analysis and Fault Injection: Setup and perform side-channel analysis to recover sensitive data, e.g. cryptographic keys, sensitive plaintext, etc. Setup and perform fault injection attacks to bypass security measures and/or recover sensitive data. • Exploit Development: Develop custom and novel exploits to bypass security measures, recover sensitive data, or gain elevated privileges in embedded systems. • Documentation: Prepare detailed documentation, including physical setups, testing procedures, and user guides, for reproducibility of found results and maintenance. • Continuous Learning: Stay current with the latest advancements in reverse engineering and hardware security to continually refine and enhance skills.

This job posting was last updated on 2/7/2026

Ready to have AI work for you in your job search?

Sign-up for free and start using JobLogr today!

Get Started »
JobLogr badgeTinyLaunch BadgeJobLogr - AI Job Search Tools to Land Your Next Job Faster than Ever | Product Hunt