Technical Lead - Embedded Systems Security; Certification & Assurance
About CENSUS
CENSUSLABS is a cyber-security engineering powerhouse specializing in securing products and organizations. Our identity is entrenched with professionalism, engineering, scientific mindset and hacking demeanor. Our work is research fueled, allowing us toprovide a diverse set of professional services. CENSUS LABS is trustedto perform product security engagements helping our clients securetheirsolutions from conception to release in a realistic risk-based approachwith our experience on end-to-end systems, including Secure Communications, IoT, Medical, Mobile and Vehicle Computer products.
Learn more about CENSUS at
About the Job /Key Responsibilities
CENSUS’ bespoke cybersecurity services are built upon a talented pool of Security Engineers, whose role extends beyond mere adherence to industry best practices. We expect our Technical Leads to hold the required expertise to take on & provide technical leadership on major projects involving emerging technologies, while managing and guiding a team of security engineers & consultants in the scope of a project’s technical activities.
Across various engagement types, Technical Leads are responsible for researching, analyzing, and resolving demanding technical challenges, while ensuring that the tasks of the technical team run smoothly and effectively.
We are looking for talented & ambitious professionals to grow our Cybersecurity Engineering team and join our ongoing mission to deliver in-depth and top-tier cybersecurity services to our valued clients. As part of this role, you will use your knowledge and experience - in the Embedded Systems Security domain - to steer our clients towards efficient strategies, architectures, implementations, and integrations, so they can satisfy their cybersecurity goals.
You will work side-by-side with our clients’ development and security teams & partners, under long-term projects that involve:
- Lead security compliance preparation activities, including gap analysis, remediation planning, and validation procedures.
- Navigate the full system stack (application layer, middleware, drivers, kernel, firmware, TEEs, etc.) to implement targeted security modifications aligned with project security requirements.
- Review, document, and refine cryptographic implementations, ensuring they meet security standards.
- Coordinate testing and validation activities to demonstrate compliance with specified criteria.
- Compile and organize technical security documentation, including architecture descriptions and assurance evidence.
- Interface with external auditors and assessors to clarify technical requirements and respond to findings.
- Guide a small team of engineers through technical implementation tasks and documentation requirements.
- MSc or BSc in Electrical Engineering, Computer Science, Computer Engineering, Electronics Engineering, or equivalent practical experience.
- 8+ years of experience in embedded, general- or special-purpose computer system-level software or firmware security. Experience can be an engineering / development position (e.g., consumer or enterprise), an assessment / consultancy role, an equivalent role in other engineering organizations, or a combination of them.
- Proven experience of 2+ years in leading embedded system security projects.
- Prior involvement in security certification or compliance initiatives.
- Proficient in English and great communication skills.
- Deep understanding of embedded system security architectures and platform security mechanisms.
- Extensive experience with cryptographic implementations in embedded devices (key management, secure storage, attestation).
- Strong programming skills in C, C++, and Java for system-level development.
- Experience with secure boot, verified boot, and hardware-backed security mechanisms.
- Familiarity with TEE environments and secure execution technologies.
- Understanding of security certification processes and documentation requirements.
- Experience with security architecture documentation, threat modeling, and security requirement compliance analysis.
- Strong analytical skills for reviewing security implementations and identifying potential…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).