Mon. Mar 16th, 2026

Hardware Hacker At Schneider Electric In Bengaluru

Schneider Electric


Location: Bengaluru

Company: Schneider Electric

As a Hardware Hacker, you will be responsible for performing hardware and embedded penetration testing, analysing device security architectures, and developing proof of concept exploits.

Job Description

  • Perform hardware security testing on embedded systems, IoT devices, and electronics.
  • Perform hardware penetration testing on OT and IoT devices such as industrial controllers, gateways, and embedded systems…etc
  • Identify and analyse hardware interfaces including UART, JTAG, SWD, SPI, I²C, CAN, and LIN.
  • Conduct firmware extraction, dumping, and analysis using hardware debug probes and specialised tools.
  • Perform firmware reverse engineering using tools such as Ghidra or IDA to analyse bootloaders, RTOS components, and embedded applications.
  • Carry out PCB exploration, trace analysis, and bus sniffing to understand device architecture and identify potential attack surfaces.
  • Conduct protocol analysis and fuzzing across interfaces such as CAN, Modbus, BLE, Wi-Fi, MQTT, CoAP, BacNet and other embedded communication protocols.
  • Evaluate wireless and RF communication channels including Bluetooth/BLE, Zigbee, and proprietary protocols.
  • Develop proof-of-concept exploits for identified vulnerabilities and demonstrate attack scenarios.
  • Contribute to security research, tool development, and internal knowledge sharing related to embedded and hardware security.

Requirements

  • 3+ years of experience in hardware security, embedded security, or device penetration testing.
  • Strong understanding of embedded architectures, microcontrollers, and hardware debugging techniques.
  • Hands-on experience working with hardware analysis tools such as JTAGulator, Bus Pirate, Tigard, OpenOCD, EasyJTAG, CAN tools, HackRF, Ubertooth, Macobox or similar.
  • Experience identifying and interacting with hardware interfaces such as UART, SPI, I²C, JTAG, SWD, CAN, and other debugging interfaces.
  • Experience performing firmware extraction, reverse engineering, and binary analysis.
  • Familiarity with embedded operating systems, bootloaders, and low-level debugging.
  • Knowledge of communication protocols used in IoT and industrial systems.
  • Experience with static and dynamic analysis of embedded firmware.
  • Ability to produce technical reports and clearly communicate security findings.

By uttu

Related Post

Leave a Reply

Your email address will not be published. Required fields are marked *