Wir bauen keine Autos, sondern gestalten innovative, ganzheitliche IT-Lösungen für Daimler. Mit unserer Expertise in Themen wie Security, Mobilität, autonomes Fahren, IT im Fahrzeug oder Digitalisierung von Produktion und Vertrieb bewegen wir uns zusammen mit unserem Mutterkonzern in die Zukunft und überzeugen dabei mit Methodenkompetenz sowie technologischer Exzellenz.
Unser Ziel: Wir machen Daimler zum innovativsten Mobilitätsunternehmen.
Be an active and visible part of our CarIT Offensive Security Team with a focus on Daimler Connected Services and products
Perform Penetration Tests of embedded devices (hardware/firmware), Linux operating systems, and backend applications in an End-to-End (E2E) approach
Develop Proof-of-Concept Exploits and contribute to improving our in-house tool landscape (fuzzers, disassembler / debugger plugins, network scanners, emulators)
Identify, report and communicate novel vulnerabilities to the Daimler Research & Development (R&D) department
Familiarize yourself with complex environments, such as vehicle network bus systems (CAN, FlexRay, Ethernet) and set up vehicle test environments
Proactively help prevent real-world attacks and analyze real-world threats
“Can do” attitude
Demonstrated expertise in identifying and exploiting novel security vulnerabilities (published Proof-of-Concept exploits, CVEs, blog posts, successful participation in hacking events / CTFs, …)
Demonstrated expertise in penetration testing with a focus on embedded Linux/Unix operating systems and/or applications (mobile and backend applications)
Demonstrated expertise in static reverse engineering and comprehending machine code of at least two of the following processor architectures: ARM/Aarch64, RH850, Tricore, x86/x64 or demonstrated expertise in performing static source code analysis of complex C/C++, Java and Golang applications
Ability to understand complex vehicle systems, identify their attack surface and prioritize attack vectors
Good oral and verbal communication skills
Good knowledge of (embedded) operating system internals
Good knowledge of file formats
Experience in developing tools in C/C++ and/or Python
Experience in performing dynamic analysis using fuzzers, emulators, debuggers and monitoring tools (AFL, Unicorn Engine, Qemu, gdb, ICE debuggers, Wireshark)