Focus on offensive security efforts for NVIDIA Data Center Systems (HGX, DGX, MGX)
Identify vulnerabilities using static and dynamic analysis
Fix bugs in close cooperation with development teams
Ensure the quality and robustness of pre-release products
Evangelize tools, practices, and plans to increase product reliability and security
Collaborate remotely and with cross-functional teams to accomplish complex goals
Requirements
BS or MS degree in Computer Engineering, Computer Science, or related degree (or equivalent experience)
7+ years in a security engineering or vulnerability researcher role
4+ years of meaningful software engineering experience
Exceptional C, ARM assembly, and Python programming skills
Experience auditing network appliances, Linux applications, and embedded firmware
Experience with secure coding practices and tooling, including static analysis tools such as Coverity, IKOS, and Checkmarx and dynamic analysis tools such as AFL, Peach, Bullseye, and LDRA
Knowledgeable in modern server architecture, hypervisor security research, and firmware analysis
Effective written and verbal communication
Ability to work collaboratively and remotely with others
(Ways to stand out) Background in reverse engineering and exploitation; experience with micro-architecture, programmable pin-outs, trusted computing; GPU-accelerated computing systems; published CVEs or security analysis samples; familiarity with caches, buses, memory controllers, DMA
Benefits
Eligible for equity
Benefits
Remote work option
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.