alarmcom

Staff Security Engineer

Apply Now

At a Glance

Location
Tysons, Virginia, United States
Experience
10+ years
Posted
2026-03-24T12:22:06-04:00

Key Requirements

Required Skills

Linux

Domain Knowledge

  • Embedded Systems
  • Engineering
  • IoT

Requirements

10+ years of information security experience, with a strong focus on offensive security, penetration testing, or vulnerability research

Prior experience performing security testing and assessment in IoT, embedded, or firmware based environments

Familiarity with using hardware debugging equipment such as oscilloscopes, logic analyzer and other tools

Familiarity with interface protocols such as UART, I

C, SPI, JTAG, and related tooling.

Experience analyzing embedded Linux systems and firmware images.

Compensation & Benefits

Our total rewards package is designed to support you holistically—in your health, your finances, and your life outside of work. The package includes medical plans with company subsidies, a Health Savings Account (HSA) with a company contribution, and a 401(k) with an employer match. We encourage a healthy work-life balance with paid vacation that increases with tenure, paid holidays, wellness time, and paid maternity and bonding leave. To complete the package, we also provide company-paid disability and life insurance, all within a collaborative and casual work environment.

Responsibilities

Perform IoT penetration testing, including firmware extraction, reverse engineering, and vulnerability discovery

Perform security research, analysis, and testing via threat modeling, vulnerability assessment, penetration testing, and/or social engineering across a wide variety of applications, platforms and systems

Use a combination of manual and automated techniques to assess risks and circumvent security mechanisms of devices and application

Oversee and manage the deployment, integration, and configuration of security solutions and enhancements to existing IoT infrastructure and the enterprise’s security documents

Select and acquire additional security solutions or enhancements to existing security solutions to improve overall IoT enterprise security

Clearly outline and document risk impacts of test findings in reports