Toyota Tsusho Europe

Product Security Engineer, Wireless Security

Toyota Tsusho Europe

full-time

Posted on:

Location Type: Hybrid

Location: PlanoTexasUnited States

Visit company website

Explore more

AI Apply
Apply

Tech Stack

About the role

  • Perform penetration testing across Bluetooth (Classic/BLE), Wi-Fi, NFC, UWB, Cellular (LTE/5G), GNSS, and other RF-based vehicle subsystems
  • Setting up a test environment to conduct analysis of the communication between the UE and eNodeB
  • Performing security assessments on wireless devices to identify potential vulnerabilities
  • Identifying various methods to circumvent security controls such as authentication mechanism on various wireless devices such as Bluetooth/Wi-Fi, NFC, etc.
  • Capturing wireless communications between a smart phone, and Device Under Test (DUT), and identify ways to impersonate the device
  • Attempting to extract and/or capture secret keys exchanged during the authentication between the two wireless devices
  • Identifying where secret keys are stored persistently upon a successful authentication between two devices
  • Identifying the type of authentication and security mode BLE peripheral/central and WPA supports
  • Performing analysis on the secure link during the BLE pairing process and identify potential misconfigurations or security flaws
  • Identifying and exploiting the vulnerabilities in NFC systems
  • Capturing, decoding and/or performing replay/relay attacks
  • Generating test reports, and recommending the appropriate course of action, and supporting the mitigation and re-validation efforts
  • Participating in research activities to investigate vulnerabilities, emerging cyber threats, and new technologies

Requirements

  • Bachelor’s degree in Cybersecurity, Computer Science, or related field
  • Strong technical expertise in various wireless protocols such as Cellular, Wi-Fi, Bluetooth, NFC, and UWB
  • Ability to perform various types of security tests such as penetration testing, fuzz testing, and evaluating the security requirements for wireless technologies
  • Hands-on experience regarding security testing Cellular network, Wi-Fi, BT/BLE, and NFC
  • Familiarity and ability to operate Cellular simulators tools such as Keysight, Anritsu, and Wi-Fi, BT/BLE analyzers and testing suites
  • Experience with scripting and automation tools for collecting and analyzing data
  • Advance knowledge of LTE, WPA2/3, NFC, BT/BLE security features
  • Proficient with SDRs platforms and experienced in tool development, including building RF-based penetration testing tools
  • Qualifications
  • Deep technical knowledge of wireless and RF-based technologies including Bluetooth (Classic/BLE), Wi‑Fi (WPA2/WPA3), Cellular (LTE/5G), NFC, UWB, GNSS, and related protocols, with the ability to assess and exploit security weaknesses.
  • Ability to plan and execute advanced penetration testing activities, including authentication bypass, key extraction, replay/relay attacks, and exploitation of protocol and implementation flaws.
  • Strong analytical skills to evaluate complex wireless communications, pairing processes, and secure links to identify misconfigurations, design weaknesses, and security vulnerabilities.
  • Experience designing, building, and operating controlled test environments to simulate real-world attack scenarios, including UE–eNodeB communication analysis and multi-device wireless interactions.
  • Proactive approach to researching emerging wireless threats, vulnerabilities, tools, and technologies, and applying findings to continuously improve testing methodologies and security posture.
  • Ability to produce clear, actionable penetration testing reports that document findings, assess risk, recommend mitigations, and support remediation and re-validation efforts.
Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard Skills & Tools
penetration testingfuzz testingsecurity assessmentswireless protocolsauthentication bypasskey extractionreplay attacksrelay attacksvulnerability exploitationdata analysis
Soft Skills
analytical skillsproactive approachreport writingcommunication skillsproblem-solving