Popular Posts

    Hardware Hacker At Schneider Electric In Bengaluru


    Location: Bengaluru

    Company: Schneider Electric

    As a Hardware Hacker, you will be responsible for performing hardware and embedded penetration testing, analysing device security architectures, and developing proof of concept exploits.

    Job Description

    • Perform hardware security testing on embedded systems, IoT devices, and electronics.
    • Perform hardware penetration testing on OT and IoT devices such as industrial controllers, gateways, and embedded systems…etc
    • Identify and analyse hardware interfaces including UART, JTAG, SWD, SPI, I²C, CAN, and LIN.
    • Conduct firmware extraction, dumping, and analysis using hardware debug probes and specialised tools.
    • Perform firmware reverse engineering using tools such as Ghidra or IDA to analyse bootloaders, RTOS components, and embedded applications.
    • Carry out PCB exploration, trace analysis, and bus sniffing to understand device architecture and identify potential attack surfaces.
    • Conduct protocol analysis and fuzzing across interfaces such as CAN, Modbus, BLE, Wi-Fi, MQTT, CoAP, BacNet and other embedded communication protocols.
    • Evaluate wireless and RF communication channels including Bluetooth/BLE, Zigbee, and proprietary protocols.
    • Develop proof-of-concept exploits for identified vulnerabilities and demonstrate attack scenarios.
    • Contribute to security research, tool development, and internal knowledge sharing related to embedded and hardware security.

    Requirements

    • 3+ years of experience in hardware security, embedded security, or device penetration testing.
    • Strong understanding of embedded architectures, microcontrollers, and hardware debugging techniques.
    • Hands-on experience working with hardware analysis tools such as JTAGulator, Bus Pirate, Tigard, OpenOCD, EasyJTAG, CAN tools, HackRF, Ubertooth, Macobox or similar.
    • Experience identifying and interacting with hardware interfaces such as UART, SPI, I²C, JTAG, SWD, CAN, and other debugging interfaces.
    • Experience performing firmware extraction, reverse engineering, and binary analysis.
    • Familiarity with embedded operating systems, bootloaders, and low-level debugging.
    • Knowledge of communication protocols used in IoT and industrial systems.
    • Experience with static and dynamic analysis of embedded firmware.
    • Ability to produce technical reports and clearly communicate security findings.



    Source link