The EHT operates on the whole Oracle portfolio of products to improve security across all engineering groups within the company. As an EHT member, you will be involved in all aspects of product security assessment, from identification to fix. We value individual contribution, and you will be given the freedom to learn and grow. We are passionate about sharing knowledge and we deeply believe that the stronger you grow, the stronger the team becomes.
Responsibilities:
You will be involved in mostly hardware security assessments, using your knowledge to identify and report security issues, as well as guidance to fix them. You will dive deep into hardware implementations, reverse engineer firmware, file formats and protocols in order to reveal subtle security vulnerabilities and implement proof-of-concept exploit attack chains, simulating the steps of real-life attackers.
A successful candidate must have genuine excitement for and interest in security, as well as the desire to share knowledge and help others learn from the high technical and ethical standards you set. Your work will benefit thousands of Oracle engineers worldwide and shape the future of product security within one of the largest software companies in the world.
Career Level - IC4
Requirements:
1. Bachelor of Science degree in Electrical/Electronic/Computer Engineering, Computer Science or related field.
2. 3+ years of experience in vulnerability research / bug hunting; public history of vulnerability discovery (CVEs, blog posts is highly desirable.
3. Practical experience with hardware attacks (. side channels, fault injection); past experience with hardware attack tools (. ChipWhisperer) is highly desirable.
4. Ability to think like an adversary, identify potentially vulnerable spots in designs and implementations, assess risk and communicate the relevant details to other team members and managers.
5. Knowledge of analogue / digital electronics and ability to understand complex schematic diagrams.
6. Ability to communicate on, monitor, and debug common embedded communications interfaces such as JTAG, SPI, I2C, RS232, USB etc.
7. Ability to build enabling prototypes (. Arduino/Raspberry Pi controlled breadboards).
8. Ability to use common hardware lab tools (. soldering iron, logic analyser, oscilloscope, function generator, power supply .
9. Knowledge of x86 and/or ARM server platform architecture and ability to read and understand x86 and/or ARM assembly.
10. Experience with disassemblers/decompilers (. IDA Pro/HexRays, Ghidra, Radare, objdump, gdb and firmware reversing tools (. binwalk).
11. Familiarity with memory corruption bugs (stack/heap/integer overflows, format strings).
12. Ability to run firmware on QEMU and knowledge of Linux OS internals.
13. Fluency in either C or C++ and proficiency with one among Python, Go, Java or Bash. Ability to self-teach any language, given appropriate resources to study and practice.
14. Excellent organizational, verbal and written communication skills.
15. Ability to work physically in our Hardware Lab in Reading - Thames Valley Park, for 50% of the time