Security Analyst

Security Analyst.

Security Analyst

Remote

|

Permanent

|

Cyber Security & Networking

About the Opportunity

An innovative technology firm developing future-proof security solutions is looking for a Secure Systems & Cryptography Specialist. This role focuses on strengthening the security of cryptographic software, embedded systems, and hardware-integrated technologies designed to resist quantum-era threats.

In this position, you'll analyze, test, and help improve solutions built around emerging cryptographic standards, including post-quantum schemes, while collaborating across hardware, firmware, and software teams.


Your Key Contributions

  • Evaluate the security of cryptographic components (including quantum-resistant algorithms) used in software and hardware products
  • Analyze attack surfaces and assess resilience to implementation-level threats (e.g., side-channel leakage, fault injection, tampering)
  • Provide input into the design of secure boot flows, key management, and embedded system protections
  • Assist in building test plans and tooling to validate security claims of prototypes and production systems
  • Document analysis results, threat models, and risk assessments for both internal teams and external stakeholders
  • Stay up-to-date on the evolving landscape of post-quantum cryptography, embedded security, and hardware-assisted protections

What You Bring

  • Background in embedded security, cryptographic software engineering, or applied security analysis
  • Strong grasp of cryptographic principles, with exposure to lattice-based and other post-quantum schemes a plus
  • Practical knowledge of software or firmware security - including how to identify or mitigate implementation-level vulnerabilities
  • Experience working with constrained devices, microcontrollers, or custom hardware environments
  • Ability to break down complex systems, identify risks, and propose mitigation strategies
  • Good communication skills for sharing technical findings with multi-disciplinary teams

Bonus Points

  • Hands-on experience with physical attack testing (e.g., power analysis, glitching, fault injection)
  • Familiarity with security compliance frameworks (e.g., FIPS, Common Criteria, PSA Certified)
  • Contributions to open-source cryptographic software or published security research
  • Scripting skills (e.g., Python) for automating security tests

Darwin Recruitment is acting as an Employment Agency in relation to this vacancy.

SUBMIT YOUR CV

Name_1
Max. file size: 1 GB.

LEBENSLAUF HOCHLADEN MIT:

This field is for validation purposes and should be left unchanged.
WOMAN-WITH-TABLET3

MARKET INSIGHTS.

USE OUR ONLINE PLATFORM TO ACCESS ALL THE INSIGHTS THAT YOU NEED...

• Salaries; split by technology and seniority level.
• Time to hire; how long it takes to secure and start a new role, or source and hire talent.
• The average tenure of professionals per tech specialism.
• Gender split per location and tech specialism.
• Fastest growing skills per tech specialism.

This field is for validation purposes and should be left unchanged.