Sign in

Cybersecurity Researcher

Ryzen Solutions
Palo Alto, CA, 94304
November 05, 2019


About the Job

The Cyber-Physical Systems Security (CPSS) area has an opening for a research scientist. Both recent Ph.D. graduates and well-established scientists are encouraged to apply.

The candidate should be familiar with the basics of security technologies, have a strong publication record in research areas related to cyber-physical security, desire to work on problems with real-world impact, and have strong implementation skills to create early-stage prototypes. Prior experience with industrial research, technology transfer and preparing grant proposals is a plus. Candidates with interest in all areas of cyber-physical security will be considered, however, those with experience in one or more of the following areas are of particular interest:

Distributed systems security

Configuration management for embedded devices and IoT devices

System identification and control-theoretic modeling for security diagnostics and prognostics

Machine learning and modeling to diagnose or predict security issues in cyber-physical systems

Graph theory and graph analytics in security settings


Formulating research problems based on real-world needs and independently conducting high-quality research

Working with existing research and development staff in CPSS and other groups on a broad range of research topics

Identifying new promising research directions and contributing them to the group’s long-term research agenda

Leading new research proposals to funding agencies and industry

Working with business development teams in identifying important business opportunities with industry and government agencies

Minimum Qualifications

PhD degree (or equivalent) in Computer Science, Computer Engineering or related field; and at least one year of experience as a Software Engineer, Software Engineer Intern, or Research Intern

Strong publication record in at least one of the following areas: cyber-physical system security, distributed systems security, system configuration management, use of control-theoretic approaches to system security

Strong system development skills