Is the job you are looking for not listed?
Let our team help you find your new job!
Are you looking for a challenging position in embedded security? Then you've come to the right place. A12 Consultants specializes in high-tech recruitment and has current vacancies for security specialists who want to work on the security of chips, firmware and embedded systems. Whether you have experience with security evaluations, crypto implementations, or hardware testing - we have roles that match your expertise.
Embedded security is about much more than traditional IT security. You work on the security of devices that are all around us: from payment terminals to IoT devices and automotive systems. These vacancies offer you the opportunity to work in specialized security labs with international customers and projects.
What to expect from A12 Consultants
As a specialist recruitment agency for high-tech, cybersecurity and IT, we understand exactly what you're looking for. We work transparently, keep you informed about the process and ensure a substantive match between your skills and the role. Whether you're looking for interim work, coming to the Netherlands as an expat or just want to take the next step in your career - we'll guide you through the entire process.
Apply quickly or sparring first?
There are two ways to get started. Do you immediately see a vacancy that suits you? Then respond immediately via the link to the role. Do you want to know what options are available first? Then send your resume or LinkedIn profile and we'll discuss together which embedded security roles best suit your background and preferences.
Current cyber security vacancies with embedded focus
We currently have five interesting roles available, all focused on embedded security and hardware/software evaluations. These features offer you the opportunity to work on cutting-edge technology for international high-tech customers.
Security Analyst Payment
In this role, you focus on security assurance and certification of payment-related embedded systems. You analyze payment terminals, secure elements and other financial hardware, perform tests and write reports for customers. Check out the Security Analyst Payment vacancy for more details about requirements and tasks.
Crypto Security Analyst
As a crypto specialist, you review cryptographic implementations in embedded context. You analyze attack vectors, develop test methods and work on high-assurance products within a security lab. This role combines technical depth with practical testing. Apply directly for the Security Analyst Crypto position.
Tech Lead Software Security Evaluations
In this leadership role, you will manage software and firmware evaluations. You are responsible for the quality of evaluations, coach junior colleagues and maintain contact with stakeholders. A perfect step for experienced security professionals who want more responsibility. Learn more about the Tech Lead Software Security role.
Tech Lead Hardware Security Evaluations
As a hardware security lead, you lead evaluations at the chip and board level. You have experience with side-channel attacks, fault injection, and other hardware-specific attack techniques. You ensure quality assurance and keep customers informed about the progress of complex evaluation projects.
Security Project Manager
This role is about successfully delivering security evaluation and certification processes. You plan projects, monitor budgets and ensure clear communication between lab, customer and certifying parties. Ideal for someone with project management experience who wants to specialize in security.
View all cyber security vacancies for a complete overview of available roles.
What does embedded security mean in these vacancies?
Embedded security is fundamentally different from traditional IT security. Instead of networks and servers, you focus on the security of devices, chips and firmware. You work on product security: how do you ensure that a smart meter, payment terminal or automotive chip is safe against attacks?
The work often takes place in specialized security labs where you help international customers with evaluations and certification. You deliver concrete products: test plans, evaluation reports and security findings that directly contribute to safer products.
Typical domains: semiconductor, payment, mobile, IoT
Embedded security is relevant in many sectors. You can work on semiconductor products, payment terminals, mobile devices, smart metering systems or automotive components. The risks you work with are diverse: supply chain security, secure boot mechanisms, key management and secure firmware updates.
Evaluation, testing and certification in a security lab
The work combines analysis, testing, and documentation. You demonstrate that a product meets security requirements by performing systematic evaluations. Important to know: there is a difference between evaluation (carrying out the assessment) and certification (formal issuance by a certifying party).
Which embedded security features are popular?
The embedded security market has various specializations. Below are the most common roles, so you can estimate which one best suits your background.
Security Analyst (Payment/Crypto): Analysis, Testing, Reporting
As a security analyst, you perform threat modeling, review crypto implementations, and test embedded systems. You write clear reports and discuss findings with engineers and customers. This role requires a combination of technical skills and communication skills.
Security Evaluator & Common Criteria (CC): What is it?
Common Criteria is an international standard for security evaluations of IT products. As an evaluator, you review evidence, carry out testing activities and ensure the correct levels of assurance. It is detailed work that requires precision and methodology, but also offers the opportunity to work on high-assurance products.
Tech Lead (Hardware/Software): content direction and quality
Tech leads combine technical depth with leadership tasks. You own quality standards, coach colleagues and maintain customer contact. It is a logical step forward from a senior evaluator or analyst role.
Project Manager Security: from scope to successful delivery
Project managers in security focus on delivery. You plan evaluation processes, manage risks and ensure clear communication between everyone involved. This role requires organizational talent and an understanding of security processes.
What skills and tools do you need for embedded security?
The skills required vary by role, but there are a few core areas that are found in almost every embedded security position. The good news: you can also inflow from embedded software or firmware development and develop security expertise on-the-job.
Software/firmware base: C/C++, Python and code review
A strong C/C++ base is essential for most roles. You must be able to read, understand and review code for security aspects. Python is often used for tooling and automation. Knowledge of secure coding practices and build chains is an advantage.
Security mindset: threat modeling and attack surfaces
You develop a security mindset by learning to think like an attacker. Threat modeling, secure boot concepts, key management and vulnerability recognition are core skills. You build this expertise through experience and training.
Hardware/embedded context: interfaces and (basic) reverse engineering
Understanding interfaces such as UART, JTAG and SWD is valuable for hardware security vacancies. You don't need to be a hardware expert, but you need to be able to read data sheets and apply basic reverse engineering techniques. These skills make the difference in hardware-focused roles.
Reporting and communication: essential in evaluations
Security evaluations stand or fall with good documentation. You must be able to explain complex technical findings clearly to various stakeholders. Writing skills and stakeholder management are therefore just as important as technical expertise.
What does the application process look like at A12?
Our process is transparent and focused on a good match. After your application, we will first schedule an intake interview to discuss your background and preferences. We then look at suitable roles and organize interviews with customers. The entire process usually takes 2-3 weeks, depending on the availability of all parties.
Do you want to know quickly if there is a match? Then send your resume or LinkedIn profile and we'll provide feedback on possible roles within a few days.
Working through A12 Consultants: transparent and international
A12 Consultants has a strong network in the high-tech and cybersecurity sector. We work with organizations that focus on embedded security testing and evaluations. Many of our customers work on international projects, which means that you often end up in English-speaking environments.
Embedded security network in high-tech and cybersecurity labs
Our network consists of specialized security labs, high-tech companies and consultancy organizations that work on embedded security. These organizations are looking for professionals who can contribute to complex evaluation and certification processes for international customers.
Expat and interim services: what do we arrange or don't arrange?
For international candidates, we offer support with relocation and administrative matters. We help find suitable contract forms and provide guidance on working in the Netherlands. The exact support depends on the specific role and customer, but we are transparent about what is possible.
Watch all cybersecurity vacancies for a complete overview of available options.
Frequently asked questions about embedded security jobs
What exactly does a Security Evaluator do and does Common Criteria experience require?
A Security Evaluator performs systematic security assessments: evidence review, testing activities and reporting. Common Criteria knowledge is often an advantage, but you can also join from embedded software, firmware or hardware development if you have the right security mindset and are willing to learn the CC methodology.
What is the difference between hardware and software security evaluations?
Hardware evaluations focus on chip-level security, side-channel attacks and physical interfaces. Software evaluations focus on code, firmware, update mechanisms, and software attack surfaces. Both share methodology and reporting requirements, but require different technical expertise.
Can I comment if I mainly develop embedded software or firmware?
Sure. A background in C/C++, debugging and embedded protocols fits well with security roles. Security-specific topics such as threat modeling and testing methods can be learned quickly. Many security professionals started this way.
How fast is the application process at A12?
After your application, we will schedule an intake interview within one week. The complete process (intake, match, interviews) usually takes 2-3 weeks. For a quick first fit check, you can also send your resume or LinkedIn profile - then we'll provide feedback on possible matches within a few days.
Ready for your next step in embedded security?
Whether you want to apply for a specific role or want to discuss opportunities first - we're happy to help. Our embedded security vacancies offer you the opportunity to work on international high-tech projects in a professional and transparent environment.
View all embedded security jobs or contact us directly to discuss your options. We look forward to your response.