Red Balloon Security
Embedded Software Engineer
New York, NY, US
Technologies & frameworks
- embedded devices
Benefits & perks
- Flexible working
To sum it up...
- Develop and scale reverse engineering toolchain towards a distributed architecture.
- Design and implement a large-scale automated test farm.
- Collaborate with security research staff to design and implement the infrastructure for the deployment of host-based defense software for black-box embedded devices.
- Optimize performance of core backend applications when dealing with extensive operations over massive sets of binary data.
- Develop and maintain in-house firmware reverse engineering framework.
Required Skills and Qualifications
- BA/BS in computer science, engineering, or a related major.
- Expertise in at least one OO programming language.
- Understanding of modern software design and engineering practices.
- High level of self-initiative and self-motivation.
Bonus Skills and Qualifications
- Experience with ARM / MIPS / PPC assembly languages.
- Strong understanding of OS design and implementation.
- Proficiency in hardware and software reverse engineering.
This is a full-time, in office position.
The First Universal Embedded Defense for all embedded devices
Symbiote is a platform-independent, OS-agnostic, real-time, host-based intrusion defense that works by layering specific defense modules and diverting unused CPU cycles for defense. Symbiote is designed to protect any and all embedded devices, from printers to PLCs. It can be applied to any device regardless of OS, CPU type, or hardware.
Borrowing from strategies seen in nature, like defense through diversification and defensive mutualism, Symbiote Defense keeps embedded systems safe against a wide variety of attacks. It defends devices without requiring any code change from the vendor, any additional or upgraded hardware, and all without impacting the functionality of the device. Red Balloon Symbiote Defense is interlaced into the binary code and data of the host it protects. It is injected into the firmware in a randomized fashion. Once injected, it operates alongside the host program during runtime and continuously ensures that the code and data of the host device is untampered and never modified without permission. Symbiote Defense starts protecting the host the instant the host turns on, and will detect any unauthorized attempts to modify the firmware’s code or data within a fraction of a second, regardless of whether the device is in sleep mode, or busy servicing requests.
New York is the most populous city in the US with more than 8 million inhabitants. A lot of immigrants from over 180 countries live in the City. Travelers are usually attracted to its cosmopolitanism and energy. New York consists of five boroughs: Manhattan, Brooklyn, Queens, The Bronx, Staten Island. New York is also well-known for its cultural heritage Empire State Building, Central Park and Statue of Liberty. The City is a center for fashion, media, culture, research and a booming tech scene.
The tech scene in New York has changed a lot in recent years. A lot of the initial excitement has worn off and settled into a stable trend of successful businesses. In both 2014 and 2015, a New York City tech company went public with a valuation of over $1 billion. It is now #2 startup ecosystem in the world, with startups raising $11.5 billion in venture capital in 2017. NYC is also the HQ of choice for Spotify, Consensys and WeWork.
Did you know...
- New York City’s Federal Reserve Bank holds $90 billion in gold
- 60M tourists visited NYC in 2016
- More than 800 languages are spoken in New York City, making it the most linguistically diverse city in the world; 4 in 10 households speak a language other than English
Red Balloon Security is a leading security provider and research firm for embedded devices across all industries. Founded in 2011 by Dr. Ang Cui, the company's core technology, Symbiote Defense, was originally developed within Columbia University's Intrusion Detection Systems Lab. Red Balloon Security’s pioneering R&D is led by a team of world-class academic researchers and developers who have published seminal research papers in the fields of embedded security and intrusion detection, led US Department of Defense funded research activities, ethically disclosed vulnerabilities within hundreds of millions of ubiquitous embedded devices and worked as embedded security researchers within various intelligence agencies.