Summary :
Imagine what you could do here! At Apple, new ideas have a way of becoming extraordinary products, services, and customer experiences very quickly.
Bring passion and dedication to your job and there's no telling what you could accomplish. Dynamic, intelligent people and inspiring, innovative technologies are the norm here.
The people who work here have reinvented entire industries with all Apple Hardware products. The same real passion for innovation that goes into our products also applies to our practices strengthening our dedication to leave the world better than we found it.
We are looking for an experienced Security Engineer with experience spanning both hardware and software. You will work with a multi-functional engineering team to define, design, and verify security systems.
Join us to help deliver the next groundbreaking Apple product.
Key Qualifications :
Solid background of applied cryptographyWorking experience in definition of secure systemsExperience in threat modeling and weaknesses analysisKnowledge of SoC architecture, microprocessor architecture a plusExposure to OS securityExcellent interpersonal skills Ability to independently pursue new ideas and innovationsGood knowledge of Verilog / VHDL Experience in C / C++ and interpretive language such as Perl / Python
Description :
As part of the Platform Architecture organization, the Security Architecture team has a mission to provide rock-solid security foundation to Apple’s products.
We evaluate security threats, define security features, architect security solutions. We collaborate with the software teams to ensure seamless security systems.
We work together with different silicon teams throughout the entire design flow to guarantee state-of-the-art security goes into various in-house and out-sourced silicon chips.
This position will be a key role to help us fulfill our mission with the following core responsibilities : - Analysis of Hardware and Software attack vectors- Definition of Hardware and Software security related features- Architecture of security solutions in HW and SW- Development of evaluation plans for both HW and SW- Communication with multi-functional teams
Additional Requirements :