DevJobs

Senior Embedded Software Engineer

Overview
Skills
  • C C ꞏ 5y
  • C++ C++ ꞏ 5y
  • Python Python ꞏ 5y
  • Assembly Assembly
  • Linux Linux
  • gdb gdb
  • Docker Docker
  • Kubernetes Kubernetes
  • ARM
  • MIPS
  • Open Source
  • x86

Why Join Us?


Check Point’s mission is to provide industry-leading security solutions that redefine the security landscape.


IoT protect team works to provide the best security solutions for IoT devices: IP Camera, Drones, Medical devices, and any smart devices.

If you want to be part of this new fascinating and fast-growing field in the Cyber Security industry, where your unique talent and value will be recognized, this is the place for you.


Key Responsibilities


  • Develop security protection techniques for embedded devices.
  • Integrate Check Point IoT Nano agent into embedded Linux-based devices.
  • Design and develop optimized code with a small footprint and integrate it into the device.
  • Develop tools for automatic deployment and enhanced code injection.
  • Learn open-source methodologies and how they impact the product.


Why it may be interesting to you:


  • Learn how IoT devices operate, how to find possible vulnerabilities on those devices, and how to protect against them.
  • Develop your investigation skills.
  • Have an opportunity to interact with the most renowned people in the cybersecurity industry.


Qualifications


  • 5+ years’ experience as a Linux developer in Python, C/C++.
  • Deep assembler (x86, ARM, MIPS) knowledge.
  • Deep understanding of LINUX internals.
  • Experience in debugging (GDB).
  • Experience with Open Source projects (modifying, building).
  • Passionate developer with a deep desire to make an impact and strive for excellence.
  • Highest sense of ownership, flexibility, versatility and creative thinking


Advantages:

  • Experience from security companies.
  • Reverse engineering skills.
  • Theoretical knowledge of Compiling, Linking, and Loading.
  • Kubernetes and Dockerized containers.
  • Security knowledge: how attacks are performed, DDoS, exploits, buffer overflows, shellcodes, ROP, etc.

Check Point Software Technologies