Position Details
About this role
This role involves researching and applying formal verification methods to enhance the security and safety of networking hardware and protocols, collaborating across teams to improve security standards.
Key Responsibilities
- Research formal verification methods
- Develop architecture solutions for security
- Collaborate on network security improvements
- Validate security protocols using formal methods
- Work with hardware and software teams
Technical Overview
The technical scope includes formal verification techniques, model checking, symbolic execution, and networking protocols such as RDMA and PCIe, with a focus on Linux security features and confidential computing environments.
Ideal Candidate
The ideal candidate is a mid-level security researcher with 5+ years of experience in formal verification, model checking, and symbolic execution, with a strong background in networking protocols like RDMA and PCIe, and familiarity with Linux security and confidential computing.
Must-Have Skills
Nice-to-Have Skills
Tools & Platforms
Required Skills
Hard Skills
Soft Skills
Industry & Role
Keywords for Your Resume
Deal Breakers
Less than 5 years of experience, Lack of formal verification or model checking background, No experience with networking protocols like RDMA or PCIe, No knowledge of Linux security features
Get matched to jobs like this
Luna finds roles that fit your skills and career goals — no endless scrolling required.
Create a Free Profile