System Security Architect at Arm
Cambridge CB2 3AP, England, United Kingdom -
Full Time


Start Date

Immediate

Expiry Date

19 Aug, 25

Salary

0.0

Posted On

19 May, 25

Experience

0 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Rtl Design, Software, Tpms, Architecture, Academic Research, Security, Technical Discussions

Industry

Information Technology/IT

Description

JOB DESCRIPTION:

We are seeking a seasoned System Security Architect with a strong background in hardware and low-level firmware security to join our Product Security team. In this design review-focused role, you’ll use your deep expertise—not to build from scratch, but to analyze, evaluate, and harden security architectures spanning from silicon to firmware layers.
You’ll collaborate with multi-functional teams to evaluate critical features like Root of Trust, secure boot flows, key management, and trusted firmware execution, ensuring every layer of the stack meets or exceeds industry security standards. If you thrive at the intersection of architecture, system software, and silicon—and love diving into the details of firmware and hardware security mechanisms—this is the role for you.

REQUIRED SKILLS AND EXPERIENCE :

  • A track record securing system architectures at the intersection of hardware and firmware.
  • Deep experience in areas such as secure boot, key provisioning, firmware mitigations, and hardware-enforced isolation.
  • Understanding of threat models including firmware exploitation, privilege-escalation, code injection, and side-channel attacks.
  • Solid grasp of Arm TrustZone, secure world monitor designs, memory and IO protection mechanisms, and SoC-level isolation techniques.
  • Experience identifying low-level security flaws and recommending hardware or firmware-level fixes.
  • Ability to lead technical discussions across architecture, firmware, software, and validation teams.

“NICE TO HAVE” SKILLS AND EXPERIENCE :

  • Familiarity with RTL design, UVM/SystemVerilog, or hardware verification flows.
  • Experience with trusted execution environments (TEEs) and secure monitor implementation.
  • Understanding of secure firmware update mechanisms (rollback protection, anti-cloning).
  • Prior work with TPMs, Secure Elements, or other hardware security modules.
  • Contributions to security standards or academic research in system security, firmware security, embedded cryptography, side channel attacks.
Responsibilities

Loading...