Embedded Systems Security Engineer (Intern)

  • Islamabad, Islamabad Capital Territory, Pakistan
  • Internship
  • Hybrid

Job Description:

AirOverflow is expanding its offensive security capabilities into the hardware and embedded systems domain, and we're looking for a curious, technically inclined intern to grow with us in this space. Embedded systems security is one of the most specialized and rapidly evolving frontiers in cybersecurity — spanning IoT devices, firmware, industrial control systems, and beyond — and AirOverflow is committed to being at the cutting edge of it. As an Embedded Systems Security Engineer Intern, you will be introduced to the methodologies, tools, and mindset required to assess and break the security of embedded hardware and the firmware that runs on it. This role is ideal for someone with a background or strong interest in electronics, low-level programming, or computer architecture who has begun to explore how these disciplines intersect with cybersecurity. You don't need to have all the answers — you need to have the right questions and the drive to find them. Under the mentorship of AirOverflow's security team, you will get hands-on exposure to real embedded targets, firmware analysis, and hardware attack techniques that very few professionals in Pakistan have experience with. If you're the kind of person who takes apart devices just to understand how they work, this role was made for you.


A Note on Requirements: Our requirements for internship positions are not strict. The job description simply outlines what we would love for you to have — not a checklist you must fully satisfy. If you are curious, driven, and eager to learn, we want to hear from you.


What You'll Do

  • Assist in firmware extraction, unpacking, and static analysis of embedded device firmware
  • Perform basic hardware reconnaissance including PCB inspection and identification of debug interfaces (UART, JTAG, SPI, I2C)
  • Support the team in conducting security assessments of IoT and embedded devices
  • Research known CVEs, attack techniques, and vulnerabilities related to embedded platforms
  • Set up and work with hardware lab equipment such as logic analyzers, oscilloscopes, and USB-to-serial adapters
  • Document findings, processes, and research in clear technical writeups
  • Contribute to internal research on emerging embedded security topics and tools
  • Participate in team discussions and knowledge-sharing sessions on hardware hacking and low-level security


What We're Looking For

  • Foundational knowledge of electronics and digital systems (microcontrollers, memory interfaces, communication protocols)
  • Basic understanding of low-level programming in C or Assembly
  • Familiarity with Linux command line and scripting basics
  • A genuine curiosity about how embedded systems and IoT devices work under the hood
  • Willingness to learn hands-on with hardware tools and lab equipment
  • Strong problem-solving skills and the ability to independently explore and research
  • Ability to document work clearly and communicate findings to the team


Nice to Have

  • Hands-on experience with microcontrollers such as Arduino, Raspberry Pi, or STM32
  • Familiarity with firmware analysis tools such as Binwalk, Ghidra, or strings
  • Basic understanding of common embedded communication protocols (UART, JTAG, SPI, I2C)
  • Exposure to reverse engineering concepts or prior use of disassemblers/decompilers
  • Interest or experience in CTFs with hardware or reverse engineering categories
  • Any coursework or projects in embedded systems, electrical engineering, or computer architecture


What We Provide

  • Mentorship from security professionals working at the intersection of hardware and cybersecurity
  • Hands-on access to a hardware security lab and real embedded targets
  • A learning path into one of the most niche and in-demand areas of cybersecurity
  • Internship certificate and letter of recommendation upon successful completion
  • Opportunity to contribute to AirOverflow's growing embedded security research and capabilities
  • Potential to transition into a full-time role based on performance and growth
  • The rare chance to build expertise in a field that very few cybersecurity professionals in Pakistan have explored