Sr. Automotive Security Tester- ETAS Law Enforcement & Security - Plymouth, MI at Geebo

Sr. Automotive Security Tester- ETAS

Company Description ETAS offers exciting career opportunities in all areas of automotive engineering and cybersecurity, sales, and related administrative areas whether youre just starting out looking for an internship, or youre a seasoned professional considering your next move.
Established in 1994, ETAS is a 100-percent subsidiary of the Bosch Group, with international subsidiaries and sales offices in Europe, North and South America, and Asia.
ETAS portfolio includes vehicle basic software, middleware, development tools, cloud-based operations services, cybersecurity solutions, and end-to-end engineering and consulting services for the realization of software-defined vehicles.
Help ETAS make the software-defined vehicle a reality.
Apply today! Job Description KEY
Responsibilities:

Independent conception, execution and documentation of penetration tests, primarily in the automotive and IoT environments
Active development of attacks, methods and state of the art tools within the security testing domain which encompasses Functional Security Testing, Vulnerability Scanning and protocol Fuzzing
Accompany the ETAS Security Sales Team to discuss common attack models with Customers to derive the tailored testing approach and create effort estimations and statements of work
Mentor and train junior penetration testers on testing techniques, processes and reporting
Meet with customers to provide status updates and discuss testing needs
Support the realization of global strategic security testing topics and objectives Qualifications Qualifications BASIC REQUIREMENTS:

Must have a Bachelor's degree in Computer Science, Software Engineering, Electrical, and Computer Engineering, or 7
years of relevant working experience in lieu of a Bachelors degree
Must have a minimum of 5
years of experience working in Automotive Engineering
Must have 3
years of working experience in penetration testing embedded systems including software & hardware and interfaces (Cellular, Ethernet, Bluetooth, Wi-Fi, and GPS)
Experience in reverse engineering against Linux, Windows, or Real-Time Operating Systems (RTOS) PREFERRED
Qualifications:

Knowledge and experience testing TCP/IP (e.
g.
IPv4) as well as CAN/CAN-FD
Protocol Fuzz Testing knowledge and experience
Experience in using Synopsyss tool suite, Defensics
Experience with decompilers (IDA Pro, Ghidra, and or Binary Ninja)
Experience using Kali Linux and/or Parrot OS
Prior experience in writing embedded code
Special knowledge in at least 3 of the following areas is highly desired:
1.
IT-Security and Cryptography2.
Programming in C, Python, and if applicable in more programming languages (e.
g.
Assembler, Java)3.
Electronics of automobiles and bus-systems4.
Internet of Things (IoT)5.
Well-grounded hardware knowledge6.
Penetration Testing of backend systems (Server, Networks) Soft Skills:

Enjoy working with Software and Hardware (Tinkerer mentality)
Creativity and curiosity at new and diversified technologies
Customer oriented, Ability to operate independently
Sense of responsibility and quality consciousness
Team spirit and communication skills Additional Information BOSCH is a proud supporter of STEM (Science, Technology, Engineering & Mathematics) Initiatives
FIRST Robotics (For Inspiration and Recognition of Science and Technology)
AWIM (A World In Motion)By choice, we are committed to a diverse workforce - EOE/Protected Veteran/Disabled.
Recommended Skills Automotive Engineering Automotive Industry Backend Bluetooth Communication Computer Engineering Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.