If you are someone who has the skills and the ability to design and conduct radio, IoT hardware attacks, paired with the knowledge and expertise of hardware attacks such as PCB reversing, Component identification, Side channel attacks, memory extraction methods, then we are looking for you. Not all superheroes wear capes, but if you do wear the cape of embedded protocols such as UART, I2C, SPI, JTAG, SWD and possible attacks on them, then don't forget to reach out to us.
Who we are?
Payatu is a GPTW certified company where we strive to create a culture of excellence, growth and innovation that empowers our employees to reach new heights in their careers. We are young and passionate folks driven by the power of the latest and innovative technologies in IoT, AI / ML, Blockchain, and many other advanced technologies. We are on the mission of making Cyberworld safe for every organization, product, and individual.
You are a perfect technical fit if :
- Strong understanding on Embedded and Hardware security
- Hands on with hardware attacks such as PCB reversing, Component identification, Side channel attacks, memory extraction methods
- Deep understanding of embedded protocols such as UART, I2C, SPI, JTAG, SWD and possible attacks on them
- Experience with Radio protocol attack such as BLE, WIFI, LoRa, DSP,SDR
- Good to have knowledge on one programming language
What we look for outside work parameters?
Your publicly known contributions are your credentialsPapers / blogs you have written, tools you have developed are your referencesYou are learning from the community and enthusiastically contributing backYou Have All Our Desired Qualities, if :
You have the technical skills mentioned aboveYou have Passion for attacking hardwareYou have a history of publishing or presenting good researchYou have excellent written and verbal communication skills and ability to express your thoughts clearlyYou can work independently as well as within a team and meet project schedule and deadlinesYou are a creative individual to think out of the box for creating different hardware attacks on productYour everyday work will look like :
Create hardware and radio attacks on existing IoT products and find vulnerabilityBreaking the IoT product for finding hardware security issuesDesign the circuits whenever needed for creating hardware attacksSharpen your saw with continuous research, learning, training on the latest tools and techniques, keeping up with new research and sharing the same with the ecosystem.Communicate well using verbal and written skills, within and out of the team