Job Description
Tenstorrent is leading the industry on cutting-edge AI technology, revolutionizing performance expectations, ease of use, and cost efficiency. With AI redefining the computing paradigm, solutions must evolve to unify innovations in software models, compilers, platforms, networking, and semiconductors. Our diverse team of technologists have developed a high performance RISC-V CPU from scratch, and share a passion for AI and a deep desire to build the best AI platform possible.
We value collaboration, curiosity, and a commitment to solving hard problems. We are growing our team and looking for contributors of all seniorities. As a Staff Platform Security Software Engineer, you’ll focus on developing and securing the lowest software layers that protect and power our AI/ML and general compute devices. Working closely with the hardware architecture team, you’ll enable a hardware-backed Root of Trust to provide security features via ROM, firmware, and software code development.
You’ll also design and build the security infrastructure that supports the device across its entire lifecycle from provisioning through customer deployment. This role is remote, based out of the United States.
We welcome candidates at various experience levels for this role. During the interview process, candidates will be assessed for the appropriate level, and offers will align with that level, which may differ from the one in this posting. Who You AreExperienced platform security engineer with 8+ years delivering production security software, including 4+ years focused on embedded systems, silicon devices, and firmware development.
You’ve lived where memory is measured in kilobytes and every clock cycle is precious. Strong coding skills in C, C++, or Rust plus Go or Python. You understand when to reach for bare-metal control and when higher-level abstractions actually solve the problem faster.
Deep expertise in secure boot, code-signing, and firmware update mechanisms, including hands-on experience with Hardware Security Modules and manufacturing provisioning workflows. Proven experience developing and testing bootloaders like U-Boot or Coreboot.
You know these systems at the instruction level and can debug boot failures armed with nothing but a JTAG probe and coffee. Working knowledge of cryptographic primitives, public key infrastructure, device attestation, and secure computing architectures. Experience with OpenTitan is particularly valued.
Skilled in RTOS development and integration using platforms like TockOS, Zephyr, or similar real-time systems. You architect for deterministic behavior where “eventually consistent” simply isn’t in the vocabulary. Experience conducting security assessments and risk analysis for firmware and embedded systems.
You find the vulnerabilities before the creative folks on the internet do. Excellent communication skills for translating complex hardware security concepts to cross-functional teams. You’re the Rosetta Stone between silicon engineers and software architects.
RISC-V architecture knowledge is a significant plus, especially experience with TEE standardization, side-channel mitigation, and performance-optimized security implementations. Working knowledge of TEE and confidential computing solutions in embedded contexts. Experience with boot ROM development and silicon device bring-up makes you even more valuable.
EWJD3