IoT Data Encryption Specialist for Bluetooth Communication

Remote, USA Full-time
We are looking for an experienced security expert to help us implement encryption for the data transmitted between our IoT device and our software. The data is currently being transmitted over Bluetooth, and we require a robust and secure encryption solution to protect sensitive information. The ideal candidate will have expertise in Bluetooth security protocols, encryption standards, and experience working with IoT devices. Design and implement an end-to-end encryption solution for data transmitted between our IoT device and our software over Bluetooth.Ensure that all data transmission is secured against eavesdropping, tampering, and unauthorized access. Work closely with our development team to integrate encryption into the current architecture. Evaluate the current communication protocols and propose improvements for data protection. Stay updated on the latest encryption standards, Bluetooth security protocols, and best practices. Perform testing and provide documentation to ensure the solution is scalable and robust. & :Strong knowledge of Bluetooth security protocols (e.g., Bluetooth Low Energy (BLE), Bluetooth 4.0/5.0 security features).Experience with encryption algorithms such as AES, RSA, or ECC. Familiarity with cryptographic libraries and frameworks for embedded systems (e.g., OpenSSL, mbedTLS). Experience with IoT device security, particularly in the context of wireless communication. Ability to integrate encryption into existing software infrastructure with minimal disruption. Strong debugging and problem-solving skills. Experience with IoT firmware development. Familiarity with Bluetooth Low Energy (BLE) stack and security implementation.Previous work in securing IoT communications and/or device-to-device encryption. Understanding of secure key exchange mechanisms (e.g., Diffie-Hellman, ECDSA). A comprehensive encryption strategy for securing data over Bluetooth. Code and/or libraries for implementing the encryption solution. Testing results and performance benchmarks to ensure the solution is robust and efficient. Documentation on encryption implementation, security protocols, and best practices. The budget is negotiable based on experience and project scope.Please provide an estimate with your proposal. Apply tot his job
Apply Now
Back to Home