alarmcom
Staff Security Engineer
At a Glance
- Location
- Tysons, Virginia, United States
- Experience
- 10+ years
- Posted
- 2026-03-24T12:22:06-04:00
Key Requirements
Required Skills
Domain Knowledge
- Embedded Systems
- Engineering
- IoT
Requirements
10+ years of information security experience, with a strong focus on offensive security, penetration testing, or vulnerability research
Prior experience performing security testing and assessment in IoT, embedded, or firmware based environments
Familiarity with using hardware debugging equipment such as oscilloscopes, logic analyzer and other tools
Familiarity with interface protocols such as UART, I
C, SPI, JTAG, and related tooling.
Experience analyzing embedded Linux systems and firmware images.
Compensation & Benefits
Our total rewards package is designed to support you holistically—in your health, your finances, and your life outside of work. The package includes medical plans with company subsidies, a Health Savings Account (HSA) with a company contribution, and a 401(k) with an employer match. We encourage a healthy work-life balance with paid vacation that increases with tenure, paid holidays, wellness time, and paid maternity and bonding leave. To complete the package, we also provide company-paid disability and life insurance, all within a collaborative and casual work environment.
Responsibilities
Perform IoT penetration testing, including firmware extraction, reverse engineering, and vulnerability discovery
Perform security research, analysis, and testing via threat modeling, vulnerability assessment, penetration testing, and/or social engineering across a wide variety of applications, platforms and systems
Use a combination of manual and automated techniques to assess risks and circumvent security mechanisms of devices and application
Oversee and manage the deployment, integration, and configuration of security solutions and enhancements to existing IoT infrastructure and the enterprise’s security documents
Select and acquire additional security solutions or enhancements to existing security solutions to improve overall IoT enterprise security
Clearly outline and document risk impacts of test findings in reports