Offensive Embedded Security - Red Team
Newark, CA
Full Time Senior-level / Expert USD 154K - 211K
Lucid Motors
Lucid is the future of sustainable mobility, designing electric cars that further reimagines the driving experience.Job Title: Offensive Embedded Security - Red Team
Position Overview:
We are seeking an experienced Offensive Security (Red Team) Engineer to lead and execute complex redteaming engagements focused on identifying and exploiting vulnerabilities across various systems and applications. You will be responsible for conducting thorough penetration tests, exploit development, and advanced security assessments—emphasizing QEMU or similar platforms for emulation and reverse engineering.
Key Responsibilities:
- Red Team Operations & Vulnerability Discovery
- Plan, execute, and document comprehensive red team exercises.
- Discover and exploit vulnerabilities using advanced techniques and tools.
- Provide detailed mitigation strategies and recommendations for identified risks.
- Security Assessments & Threat Modeling
- Perform security assessments, architecture reviews, and threat modeling for new and existing systems.
- Identify, prioritize, and communicate vulnerabilities and risks to relevant stakeholders.
- Advanced Analysis & Exploitation Techniques
- Conduct static and dynamic analysis (including fuzzing) to identify and validate security weaknesses.
- Perform reverse engineering to uncover hidden or novel vulnerabilities.
- Develop and refine proof-of-concept exploits to demonstrate real-world attack scenarios.
- Emulation & Virtualization
- Utilize QEMU or similar platforms to emulate hardware platforms and Real-Time Operating Systems (RTOS) for advanced security testing.
- Demonstrate deep knowledge of virtualization/emulation concepts such as TCG (Tiny Code Generator), intermediate representations (IR), and translation blocks.
- Customize or extend emulators to simulate specific environments for vulnerability research.
- Collaboration & Reporting
- Partner with cross-functional teams (DevOps, product, engineering) to integrate security findings into development processes.
- Communicate technical findings effectively to both technical and non-technical audiences, providing clear remediation guidance.
Required Qualifications:
- Offensive Security Experience
- 3+ years in penetration testing, red team operations, or exploit development.
- Proficiency with standard offensive security tools, techniques, and frameworks.
- Deep Knowledge of QEMU or Similar Emulators
- Expertise in QEMU architecture, including TCG, IR translation, and runtime block execution.
- Experience tailoring emulators for security research and vulnerability analysis.
- Reverse Engineering & Analysis
- Demonstrated capability with reverse engineering tools (IDA Pro, Ghidra, Radare2) to dissect binaries, firmware, or OS components.
- Familiarity with fuzzing frameworks (e.g., AFL, libFuzzer) and static analysis methods.
- Real-Time Operating Systems (RTOS)
- Experience emulating or analyzing RTOS environments for security vulnerabilities.
- Understanding of embedded systems, firmware development, and low-level communications protocols.
- Programming & Scripting Skills
- Proficiency in languages like C/C++, Python, Assembly, or Rust.
- Solid grasp of Linux/Unix environments and common scripting tools.
- Bachelor’s degree in Computer Science, Electrical Engineering, or a related field is required.
Preferred Qualifications:
- Master’s degree or higher education is preferred.
- End-to-End Security Approach: Familiarity with integrating security testing into the software development lifecycle.
- Cloud and Container Security: Basic understanding of cloud platforms (AWS) and container environments.
- Leadership & Mentoring: Ability to guide and mentor junior members on security best practices.
By Submitting your application, you understand and agree that your personal data will be processed in accordance with our Candidate Privacy Notice. If you are a California resident, please refer to our California Candidate Privacy Notice.
To all recruitment agencies: Lucid Motors does not accept agency resumes. Please do not forward resumes to our careers alias or other Lucid Motors employees. Lucid Motors is not responsible for any fees related to unsolicited resumes.Tags: AWS C Cloud Computer Science DevOps Exploit Exploits Ghidra IDA Pro Linux Offensive security Pentesting Privacy Python Red team Reverse engineering RTOS Rust Scripting SDLC Security assessment UNIX Vulnerabilities
Perks/benefits: 401(k) matching Career development Competitive pay Equity / stock options Health care Insurance
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.