Cybersecurity Firmware Engineer, Mid at Booz Allen
Rome, NY 13441, USA -
Full Time


Start Date

Immediate

Expiry Date

14 Dec, 25

Salary

61900.0

Posted On

16 Sep, 25

Experience

3 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Technical Documentation, Operating Systems, Vhdl, Logic Analyzer, Intel, System Generator, Matlab, Systemverilog, Xilinx, Sscp, Automata, Opencl, Red Hat

Industry

Information Technology/IT

Description

BASIC QUALIFICATIONS:

  • 3+ years of experience in the electrical or computer engineering field
  • Experience with VHDL or OpenCL firmware programming
  • Experience implementing Linux Operating Systems, including Red Hat
  • Experience analyzing and executing test plans and procedures
  • Experience developing or analyzing technical documentation
  • Knowledge of an FPGA device, including Xilinx, Intel, or Microsemi
  • Secret clearance
  • Bachelor’s degree
  • Ability to obtain a DoD 8570 IAT Level II Certification, including Security+ CE, CYSA, SSCP, or GSEC Certification, within 6 months of hire date

ADDITIONAL QUALIFICATIONS:

  • Experience with HDL verification techniques, including SystemVerilog, OVM, or UVM
  • Experience with higher-level code development, including Nvidia CUDA, OpenCL, Simulink HDL Coder, and Xilinx System Generator
  • Experience with ASIC design flows and FPGA architecture
  • Knowledge of hardware or firmware simulation tools, including MATLAB
  • Knowledge of digital signal processing functions and automata theory
  • Knowledge of hardware testing equipment, including an oscilloscope or logic analyzer
  • Knowledge of digital board design of complex mixed-signal boards to support FPGAs
  • TS/SCI clearance

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities

Collaborate in a team-based environment to test and evaluate systems against a set of security requirements to evaluate potential risk. Gain an understanding of and develop potential testing methodologies based on vendor-provided system documentation. Utilize functional and working or industry knowledge to review hardware description language to identify potential threat vectors. Assess hardware and software-based cross domain systems to ensure security compliance against strict DoD requirements. Conduct analysis and testing to identify vulnerabilities and potential threat vectors in assessing various cross-domain systems, identify exploits, and develop attack methodologies. Apply specific functional and working or industry knowledge. Develop or contribute to solutions to a variety of problems of moderate scope and complexity when needed. Create reports based upon the results of hands-on testing and brief stakeholders on any findings identified. Conduct research in the areas of hardware-based filtering technologies to grow understanding across the department and support business needs.

Loading...