In this role you will review security evaluation reports and carry your own hardware security evaluation/penetration testing to ensure the Device Under Test reaches the required security level. In the event vulnerabilities are identified, you will be responsible for identifying, proposing, and driving implementation of mitigation measures in software or hardware.