PSocial network you want to login/join with: /ppThe Security Engineer will work directly with development teams working on complex emerging projects to understand their system and business needs and help them understand how to build secure platforms and solutions. /ppThe “Product Security Team” is a global group which supports product security topics with the different Telit RD divisions (worldwide). The group is part of Telit Global RD division with a focus on cloud platforms and IoT embedded modules (from NB-IoT up to 5G). /ppbCOMPETENCY REQUIREMENTS /b /ppbEducation and Training /b /ppbResponsibilities: /b /pulliIdentify security issues and risks, and build mitigation plans /liliInterpret and support the adherence to the international cybersecurity regulations and standards /liliImprove support for developers by working directly with them to understand security requirements. /liliDesign and develop security automation solutions to optimize security operations. /liliShare technical security information and new cyber risk for Telit products inside the organization /li /ulpbRequirements: /b /pulli4+ years of experience in embedded systems development and/or embedded security engineering. /liliRelevant experience in embedded security and strong understanding of security concepts, including secure boot, hardware-based security, and authentication mechanisms. /liliHands-on knowledge of information security technologies such as security design review, threat modeling, risk analysis, and software testing techniques. /liliHands-on experience with security testing tools, vulnerability management tools, and secure development environments. /liliExcellent English written and verbal communication skills /liliAbility to work with cross functional teams /li /ulpbPreferred Qualifications: /b /pulliExperience with Linux, AOSP or RTOS /liliProficiency in programming languages such as C/C++ or Python /liliExperience with software development methodologies, code reviews, and version control /liliKnowledge of secure coding practices, including mitigating common vulnerabilities. /liliStrong understanding of cryptographic algorithms, key management, and secure communication protocols /liliFamiliarity with embedded architectures, such as ARM and related security architecture /li /ul #J-18808-Ljbffr