info@securemicro.com +1 602-989-4355

Application Domains

Embedded cybersecurity solutions for critical infrastructure, e.g., satellite systems, command and control systems, nuclear reactors, industrial control systems, and communications systems.

Capabilities & Products 

We design, develop, and deploy secure hardware, firmware, and software solutions, e.g., secure processors, ASIC accelerators, radiation-hardened and FPGA-based designs - SMT-IPSolutions™  .

Engineering Services

We assist our clients with agile digital designs development, feasibility studies, prototyping, cyber posture assessments, ISO standards cybersecurity compliance, and crypto-agility.

Partners & Customers

We support government agencies, national laboratories, and the defense industrial base with their advanced, secure, and trusted embedded system’s needs. We make their mission our mission.  

About Us

Secure Micro Technologies, through key emerging concepts, formal methods, techniques and architectures, designs and develops for clients secure software, firmware, and hardware solutions.

Mission Statement

Brought together by our collective passion for designing secure computer systems, we have elected this company to embody our shared conviction of supporting our local and federal government partners and the defense industry base through the development of transformational cybersecurity capabilities.

Technical Leadership

Collectively, the core team has over 65 years in designing and deploying secure and high-assurance computing systems for the Department of Defense and our defense industry partners. More than half of the team has advanced degrees in Computer Engineering, Computer Science, Electrical Engineering, or Industrial Engineering. We pride ourselves in advancing security and resilience in critical infrastructure systems.

Technical Expertise

We specialize in the design of hardware-assisted end-to-end secure computing systems, from edge to data-center scale.

  • Data in manipulation (Processing)
  • Data in motion (Communication)
  • Data at rest (Storage)

Core Capabilities & Product Lines

  • Secure Software & Firmware Development
  • Secure Hardware Development
  • Secure Architectures & Embedded Systems 
  • Algorithm Development & Optimization 
Learn More

Consultancy & Engineering Services

  • Cyber Operations Improvement
  • Cybersecurity Risk Management
  • Technical Requirements Gathering
  • Digital Design Services - FPGA, ASIC, PCB
Learn More

Capability Statement

Here is a concise one-page summary of the services and capabilities that Secure Micro Technologies offers [PDF].

Technologies

Secure Micro Technologies, LLC engages in research and development of the latest technologies to enable full-stack secure microelectronics/electronics systems.

The team designs, builds, and deploys:

  • Hardware-as-root-of-trust approach to secure end-to-end computing systems prototyping, including the use of formal micro-contracts and program execution obfuscation;
  • Crypto-agility solutions for secure digital systems communication, including low-power and advanced encryptions;
  • Advanced security methods for sharing data and information including secure group anonymous authentication and fast dynamic device authentication using Lorenz chaotic systems.

In addition, the company works on deploying robust tools for side channel and fault attacks analysis, designing countermeasures, circuit camouflaging, hardware as root of trust-based authentication, secure mobile and IoTs systems, and data privacy evaluation.

Hardware Root-of-Trust Approaches

Our unique set of solutions include technology to provide each chip with a unique chip fingerprint (UID) with anti-tampering secure storage for keys and physical/electrical side-channel resistance, formal micro-contracts, e-fused boot memory, and digitally signed instruction memory.

Post-Quantum Agility  

We are at the forefront of the implementation, analysis, and deployment of emerging post-quantum cryptography (PQC) algorithms with some of the most advanced hardware accelerators. We can assist in improving your cryptographic agility and accelerating your post-quantum transition.

Secure RISC-V Architecture Solutions

A complete customizable secure RISC-V design and deployment ecosystem, including compiler and operating system support, to provide an end-to-end security including code execution isolation, dynamic tracking of data and memory operations with hardware support authentication.

Efficient Homomorphic Encryption Solutions 

We have a proven suite of hardware design libraries for accelerating the arithmetic operations involved in Ring Learning with Error (RLWE)-based algorithms. Library components include RNS, CRT, NTT-based polynomial multiplication, and ISA supported operations.

Advanced Security Data Sharing Techniques

Our portfolio of data sharing technologies includes GAAP-Designer™ (Group Anonymous Authentication Protocol), RASSS-Designer™ (Robust Adaptive Secure Secret Sharing), and other privacy-preserving tools using multi-party computation (MPC) and homomorphic encryption (HE).

Hybrid Mobile Cyber Ranges 

Our mobile networked security command centers with hybrid threat assessment capacity for both cyber and physical assets enable high-fidelity, hardware-in-the-loop, instances to accurately simulate and detect malicious cyber events in real time with data visualization capabilities.

Products

Our team specializes in the development of secure connected embedded systems for high-assurance use, innovative and formally-verified secure microprocessor designs, and flexible and modular secure open-architectures.

Commercial Off-The-Shelf (COTS) solutions have many advantages, but they also suffer from one-size-fits-all designs syndromes where your design is full of prepackaged features and capabilities that are not needed. Some of the sacrifices are security (i.e., larger attack surface), least-targeted performance, and energy usage.

In comparison to our proprietary customized system designs combine an open-architecture approach with a higher degree of flexibility at a much lower cost.

  • All Solutions
  • Complete System Solutions
  • Hardware Solutions
  • Software Solutions
  • Algorithmic Solutions

SMT-Bulwark™

Our complete and secure RISC-V ecosystem provides end-to-end security including code execution isolation, dynamic tracking of data and memory operations with hardware support authentication.

SMT-IPSolutions™

We provide formally proven security intellectual property (IP) blocks, physical designs, radiation-hardened secure embedded processors, and open-source secure hardware solutions.

SMT-CyberRange™

Hybrid cyber range capabilities for training, cyber incident response readiness, sharpening and clarifying cyber operations, assessment of cyber posture and real-time cyber-event escalation.

SMT-Guards™

SMT-Guards™ enables formally verified design of device-oblivious secure interface architectures with programmable access control and authentication parameters including automated hardware generation.

SMT-Designer™

The SMT-Designer™ platform is a software/hardware codesign Electronic Design Automation (EDA) tool for comprehensive integrity, confidentiality, and availability evaluation of cyber-hardened architectures.

SMT-Crypto™

Advanced Data Encryption Solutions with hardware accelerations for quantum-resistant encryption algorithms, homomorphic encryption, multi-party computation, and low-power design deployments.

SMT-DataExplorer™

The SMT-DataExplorer™ is a visualization tool for cyber event data parsing, feature selection, sanitization, and normalization, clustering, machine learning model training, and results visualization.

SMT-Assessor™

A tool suite to assist our clients with their verification & validation (V&V) needs, especially in safety and security critical applications through a set of formal methods and ISO/NIST standards checkers.

SMT-SoSE™

We are a leader in SoSEE-based design. Our novel agent-based learning and adaptation formulation for SoSEE designs enables the integration of heterogeneous sub-systems, secure and non-secure, into the same design.

Engineering Services

Secure Micro Technologies' Engineering Services is uniquely positioned to help our clients minimize risk through feasibility studies and early prototypes from FPGA, ASIC, and PCB designs to software development.

We service industries with high-assurance and security design requirements. This includes aerospace and defense, medical devices, automotive, industrial machinery, and energy sector.

Our Core Services:

  • Technical requirements gathering, algorithm development, software development, legacy system modernization, FPGA, ASIC, and PCB design and development.
  • Application target areas include radar systems and algorithms, multi-spectrum image processing systems, UAV and aerial, rad-hard and space bound electronics, GPS and navigation, and high-performance digital signal processing.
  • Cyber operations analysis and improvement, cybersecurity analysis and management, and cybersecurity compliance and hardening.

Extend your technical team with Secure Micro Technologies' Engineering Services. Let us be your rapid prototyping and testing support partner for your digital and embedded system design needs.

Flexibility in Design and Implementation

Secure Micro Engineering Services offers unparalleled flexibility in design and development. This flexibility allows for easy modifications and adaptations, enabling you to respond quickly to changing requirements or feedback.

Support for Emerging Technologies

As new technologies open possibilities for innovative security designs. Secure Micro Engineering Services is a well-suited partner, allowing for quick experimentation and adoption of the latest hardware design techniques or customization.

Risk Mitigation

Developing new products involves inherent risks. Secure Micro Engineering Services allows you to test the waters using our software, firmware, and hardware design expertise, reducing the potential financial impact if the product does not perform as expected.

Reduced Initial Investment and Tooling Costs

Unlike in-house digital design, working with Secure Micro Engineering Services requires less direct investment in staffing, tooling, and setup. This cost efficiency and the staffing overhead make it a viable option for many businesses looking to bring new products to market quickly.

Team

Excellence, Teamwork, and Inclusion are the core values of our company. We are always looking for exceptional talents to join our team in this fateful journey of providing technical support to the U.S. defense industrial base. We believe that excellence and success can be inclusive.

Heather R. Kinsy, MBA, PMP

President & Chief Executive Officer

Heather joins Secure Micro following a more than twenty-year career spanning management consulting and industry. Previously held roles include Director, Account Management overseeing Patient Registries at IQVIA and Principal Consultant at Systems Evolution, Inc.

Debra Yoder-Storace

Chief Financial Officer

Debra brings more than four decades of fiscal management. She oversees Secure Micro's financial activities, including internal and external financial reporting, compliance, and assets management. She thrives in providing solid financial guidance for the overall success of the company.

Greg Burns

Managing Director

Greg, a US veteran, joins Secure Micro following a successful fifteen-year tenure at Northrop Grumman, where he held key roles as Mission Assurance Manager and Program Manager. His experience includes positions at Abrams Airborne Manufacturing, Honeywell, Rogers Corporation.

Yash Mehta, M.S.

Head of Software Development

Yash is an experienced full-stack developer and solution architect adept at engaging with cross-functional teams across changing business requirements. Among others, he has led the development of a Privileged Access Management system actively used in over 50 companies across 5 countries.

Alan Ehret, Ph.D.

Head of Hardware Development

Alan brings to Secure Micro a deep expertise in designing end-to-end secure computing systems. This includes architecture design and FPGA/ASIC prototyping. Alan was part of the engineering faculty at Arizona State University, where he also earned his doctoral in Computer Engineering.

Marijosse Tostado, B.S.

Finance Specialist & Technical Outreach Associate

Marijosse supports the company's organizational efficiency and financial management. She holds a B.S. in Economics with a focus on Political Economy. She brings valuable experience from her time at the state capitol, where she developed a keen understanding of legislative processes and public policy.

Bhargav R. Vangala, B.Tech.

Software Developer

Bhargav has many years of industry experience including Software Development Engineer-II at Zuora and Technology Analyst at Morgan Stanley. His technical skills include Java, Python, JavaScript, among others. He has Bachelor of Technology in Computer Science and Engineering.

Kelly Xu, B.S.

Hardware Developer

Kelly is a Massachusetts Institute of Technology (MIT) graduate with a B.S. in Computer Science and Engineering and a minor in Economics. Her prior experience includes FPGA development, processor design, and software engineering. Kelly plans to return to MIT for her Master of Engineering next year.

Robert Ashby, B.S.

Embedded Software Development Consultant

Robert is a senior electrical engineer with expertise in the semiconductor industry, particularly focusing on the maintenance and servicing of equipment used in wet cleans and diffusion processes. He works with other RF engineers on signal and power supply designs for load control.

Gregory Barr

Business Development Associate Principal

Greg has decades of experience in multiple functional areas, including enterprise solutioning of service, infrastructure, voice, data, and video-based architectures. Strong knowledge of Software Defined Radio waveforms via support of the Joint Tactical Radio Systems ACAT 1 Program of Record.

Business Support Group

Administrative Support & Technical Outreach

Behind the Phoenix team is a dedicated and committed support and business development staff, noticeably, George Mendoza, Technical Outreach Lead, Nicole Campbell, Human Resource Manager, and Aretta O. Eze, Technical Outreach Associate and DC Representative.

Board of Advisors

Trusted Technical & Business Advisors

Guiding the leadership team and serving as a valuable resource for the company's strategic decision-making process is the Board of Advisors. Led by Col. (Ret) Dennis Beal, the board members lend their expertise and knowledge to the company and help frame its objectives and priorities. 

News

  • Announcement – New Managing Director!

    Greg Burns brings more than fifteen years of experience in program management, quality management, proposal management, process development, manufacturing management, account management, and team development within the US defense industrial base. Greg spent the majority of his career at Northrop Grumman Corporation. Most notably, he served as the Mission Assurance Manager and a key member of the Senior Leadership Team for the company's GMD Program.

    As the Managing Director of Secure Micro Technologies, Greg oversees all programs and personnel, including program development, engineering, manufacturing, and supply chain management, to guarantee compliance with internal guidelines and customer agreements. He implements organizational procedures and systems that adhere to industry standards and meet client needs. Furthermore, he is tasked with leading the development of new initiatives, managing their budgeting, collecting technical requirements, and negotiating contracts.

    Greg's record demonstrates his skill in fostering unity among employees and teams, as well as nurturing their skills to advance their professional growth. In his role, he leverages his ability to inspire and rally team members towards a shared objective.

    Greg has previously held positions at Abrams Airborne, serving as the Regional Account Manager, as well as positions at Honeywell and Rogers Corporation. Additionally, he served in the Arizona Air National Guard from 1982 to 2002. Greg is a graduate of Arizona State University with a Bachelor of Science degree.

    We are pleased to welcome Greg and his exceptional leadership abilities to Secure Micro Technologies.

  • Secure Micro Technologies is launching our latest network monitoring and segmentation technology. The new data diode connector allows hardware-enabled one-way communication with real-time packet capture and analysis.

    This technology enhances cyber threat management for critical systems by offering non-interactive monitoring, in-network traffic analysis, and event-triggered self-reconfiguration.

    This innovative data diode technology allows secure one-way communication using fiber-optic connections, ensuring data cannot be sent back. It creates an airgap between trusted and untrusted network sections with isolated communication and configuration interfaces.

    It offers the most robust assurances to date in terms of isolating outdated systems, healthcare equipment, and essential infrastructure from consumer-based information technology (IT).

    Reach out for a demonstration.

  • We are thrilled to welcome Heather R. Kinsy as our new President. Her outstanding leadership and expertise will be invaluable in guiding Secure Micro Technologies through its next phase of growth and development.

    As a fast-growing technology company, we must demonstrate growth-focused managerial strategies. This is exactly what Heather brings. She is excited to lead our talented team and build on the company's strong foundation, capitalize on new opportunities, and chart a path of sustained success.

    Heather has a more than twenty-year career spanning management consulting and industry. Previously held roles include Director, Account Management overseeing observational Patient Registries at IQVIA and Principal Consultant leading critical projects as a trusted advisor for Life Sciences and BioPharma organizations at Systems Evolution, Inc. Heather holds a Master of Business Administration and Bachelor of Science in Industrial Engineering from Arizona State University, and many professional certifications.

    As a Co-Founder and a leader, Heather welcomes feedback, is willing to iterate on ideas and focuses on finding the best path forward for collective success. We look forward to an era of continued growth, innovation, and success under Heather's leadership.

  • Legacy electronics in many critical systems and infrastructures are a fertile ground for cyber attacks and represent a core vulnerability in our national security posture.

    Bulwark is a hardware module with flexible interfaces that can be used as a protective shield for another electronic device. It enables the design of device-oblivious secure network architecture with programmable access control and authentication parameters. We have a tool for users to specify the composition and enforcement of their defined secure and access rules at a device’s interface.

    Bulwark advances what engineers can do in terms of legacy embedded systems and critical infractures modernization. For example, with Bulwark, you can completely decouple the externally observable I/O from the legacy system native I/O. Therefore, providing a strong cyber shielding from the legacy system. The Bulwark's reconfigurable fabric enables (1) minimization of any communication transformation latency and (2) custom hardware root-of-trust policies implementation.

    Reach out for a demonstration.

  • We are delighted to welcome Dr. Alan Ehret as our new Head of Hardware Development.

    As a Co-Founder, Alan understands the company's vision and values. He is excited to bring his engineering expertise full-time to Secure Micro Technologies to help the company reach its full potential.

    His experience includes end-to-end system design, prototyping, and evaluation, comprising high-level algorithmic description, architecture design, RTL implementation, FPGA emulation, ASIC development, and PCB fabrication and bring-up.

    Alan previously served as an Assistant Research Professor in the School of Computing and Augmented Intelligence (SCAI), Ira A. Fulton Schools of Engineering, at Arizona State University. He led the Computer Architecture and Embedded Systems Laboratory in the Secure, Trusted, and Assured Microelectronics Center.

    Alan received his B.S. in Electrical Engineering from Miami University and his Ph.D. from Arizona State University.

  • Secure Micro Technologies has released its next-generation mobile hybrid cyber range platform, The Pioneer™, the latest version in its SMT-CyberRange™ series, for complete cybersecurity solution design, testing, education, and training for critical infrastructures.

    A unique feature of The Pioneer™ is its Hardware-in-the-loop (HIL) modality support. It enables the integration of various Internet of Things (IoT) devices and Supervisory Control and Data Acquisition (SCADA) systems into the testing environments. It opens up the range of critical infrastructures (e.g., power grid systems, industrial systems) that can be simulated or emulated or tested with high-fidelity.

    The Pioneer™ has all the capabilities of traditional cloud-based cyber ranges in addition to supporting hardware-in-the-loop modalities - ICS/PLC/SCADA – for high-fidelity coverage of security modalities comprising critical infrastructure operational technology (OT). It aids in the analysis of physical/hardware versus pure cyber cybersecurity vectors, and serves as a testbed for securing the IoT devices or supporting mobile tactical ad hoc networks.

  • We are a leader in post-quantum cryptosystem acceleration. Some of our team members were performers on the NIST PQC Competition and have been part of the multi-year evolution process.

    Secure Micro Technologies' Crypto Team design and formally-verified post-quantum accelerator. We do algorithm analysis. We design highly-optimized, parameterizable hardware modules for post-quantum algorithms and application acceleration and their cryptanalysis.

    Our post-quantum hardware primitives support the four frequently used security application domains: the public key cryptosystem (PKC), key exchange (KEX), oblivious transfer (OT), and zero-knowledge proof (ZKP).

    The PKC and KEX form the basis of most modern cryptographic systems. The OT is used in many privacy-preserving applications, e.g., DNA database query and private machine learning. Similarly, ZKP is used in a number of applications, such as a potential candidate for the next generation of blockchain algorithms.

    In addition to our proprietary highly optimized, fully verified, and fully parameterizable units, we have also worked with our academic collaborators to provide to the community an open-source hardware library that includes the synthesizable and parameterizable RTL code with efficient N-point Number-Theoretic Transform (NTT) modules for fast polynomial multiplications.

    learn more

  • Kelly Xu is a recent Massachusetts Institute of Technology (MIT) graduate with a Bachelor of Science in Computer Science and Engineering and a minor in Economics.

    Kelly is very passionate about innovation. She has prior experience in a range of roles, including processor design, FPGA development, and software as a technology analyst. She also has knowledge in biology, having worked as a researcher and biomedical scientist performing data analysis.

    Kelly will contribute to our secure processor design projects. She will lead the design, implementation, testing, and integration efforts of the floating point unit. She will assist in our post-quantum hardware security module design and trustworthy AI accelerator design efforts.

    Kelly is planning on returning to MIT for a Master of Engineering in Electrical Engineering and Computer Science next year.

  • This release spans the full stack from application benchmarking to runtimes, tools, Operating system (OS), and the simulation, emulation, ASIC prototyping, and UI for easy programming.

    Memory vulnerabilities remain a top issue for modern computing systems. Therefore, with our partners, we are introducing a new capability-based architecture that uses a Namespace-based capability model to support globally shareable capabilities in a multi-node system. A key advantage of the capability model is compatibility with existing code-bases.

    With this release, users can have access to the micro-architecture, the physical development board, the capability compiler, supporting operating system, a suite of high-performance and memory safety benchmark applications for the testing and validation of the system, and access to the Secure Micro UI for easy programming.

    Please email us [info@securemicro.com] if you would like to be part of our Early Release User (ERU) Program. The number of boards available for the ERU program is limited and accessed on a first-come first-served basis.

    learn more

Career

We are a fast growing small business with an employee-ownership model of operation. If you are a hard-working individual, love working with passionate people, and want the opportunity to grow with an emerging company, please join our team. We are hiring in a number of positions - hardware, software, systems, and administrative roles.

  • Office Manager

    Secure Micro Technologies, LLC is looking for an Office Manager to join our downtown Phoenix office. We are a dynamic team and looking for an energetic, fast learner to join and grow with us. You will play a critical role in supporting our technical objectives with the effective execution of office operations. Responsibilities include overseeing clerical tasks, collecting and maintaining files, scheduling meetings, and sending meeting invites, participating in meetings, and taking notes for participants, and interacting with clients and visitors. The right candidate must have excellent written and verbal communication skills, the ability to prioritize tasks, good time-management skills, and experience working with basic office software.

    Responsibilities

    - Organize and schedule appointments
    - Plan meetings and take detailed minutes
    - Write and distribute email, correspondence memos, letters, and forms
    - Assist in the preparation of regularly scheduled reports
    - Develop and maintain a filing system
    - Update and maintain office policies and procedures
    - Order office supplies
    - Book travel arrangements
    - Submit and reconcile expense reports
    - Provide general support to visitors
    - Act as the point of contact for internal and external clients

    Requirements and skills

    - Proven experience as an Administrative Manager or Office Admin Manager - Knowledge of office management systems and procedures - Working knowledge of office equipment, like printers - Proficiency in MS Office (MS Excel and MS PowerPoint, in particular) - Excellent time management skills and the ability to prioritize work - Attention to detail and problem-solving skills - Excellent written and verbal communication skills - Strong organizational skills with the ability to multi-task

    Benefits Summary

    Regular full-time and part-time employees have access to medical, dental, and vision plans, a wellness program, health saving accounts, flexible spending accounts, 401(k) plan, employee stock purchase program, paid holidays, and paid leave, in accordance with state and local law.

    For interested applicants, please send your resume and a cover letter to Nicole Campbell at ncampbell@securemicro.com.

  • Jr. Hardware Engineer

    Secure Micro Technologies, LLC is looking for a Junior Hardware Engineer to join our downtown Phoenix office. We are a dynamic team looking for an energetic, fast learner to join and grow with us. You will play a critical role in supporting our FPGA (Field Programmable Gate Array) and ASIC (Application-Specific Integrated Circuit) prototyping activities. Responsibilities include architecture/microarchitecture specification, design, modular implementation, software simulation and validation, register-transfer level (RTL) implementation and simulation, FPGA/ASIC design, implementation and validation, and working closely with the software and system integration teams. In addition, detailed documentation code or debugging activities and weekly development reports must be submitted. The right candidate must have excellent written and verbal communication skills, the ability to prioritize tasks, good time-management skills, and experience or eagerness to learn HDL programming and related tools - e.g., Verilog, VHDL, embedded C/assembly programming, hardware/firmware verification , simulation/testbench development, Xilinx and Altera tools and boards, and ModelSim/QuestaSim simulation tools.

    Responsibilities

    - Participate in the design and development of hardware components including processors, accelerators, circuit boards, and memory cards
    - Assist with writing detailed functional specifications for the hardware design and development process
    - Participate in the full hardware design cycle including specification, development, simulation, debugging, and improvement processes
    - Provide hands-on support for the building, testing, and modification hardware modules in software, RTL, FPGA, and ASIC
    - Research and analyze design concepts, processes, technologies, and related products

    Requirements and skills

    - Bachelor Science in Computer Engineering, or Electrical Engineering, or related field
    - Experience with Modelsim, and Quartus
    - Expertise using Verilog/VHDL for implementation and verification of FPGA designs
    - Experience with FPGA-based interconnects, including Avalon and AXI architectures
    - Excellent time management skills and the ability to prioritize work
    - Attention to detail and problem-solving skills
    - Excellent written and verbal communication skills
    - Strong organizational skills with the ability to multi-task

    Benefits Summary

    - Our benefits package is designed to reward contribution and loyalty and to attract the kind of talented individuals who have their pick of employers
    - Competitive Base Salary: Compensation aligns with experience and special expertise
    - Stock Options: Option vesting each year over an arranged period, offering a long-term incentive for your contribution to the company’s growth
    - Core Benefits: Comprehensive medical, dental, vision, matching 401K plans, paid holidays, and paid leave, in accordance with state and local law

    For interested applicants, please send your resume and a cover letter to Nicole Campbell at ncampbell@securemicro.com.

  • Jr. Software Engineer

    Secure Micro Technologies, LLC is looking for a Junior Software Engineer to join our downtown Phoenix office. We are a dynamic team looking for an energetic, fast learner to join and grow with us. You will play a critical role in supporting our software development life cycle. Responsibilities include designing, coding, testing software applications, assisting with the development of new features and enhancements, participation in brainstorming sessions for new ideas, selection of the correct programming language and abstraction level for the effective design, implementation, and debugging of new software features, providing detailed documentation code and debugging activities. The right candidate must have excellent written and verbal communication skills, the ability to prioritize tasks, good time-management skills, and experience working with different programming paradigms and languages, particularly C, C++, Java, Rust, JavaScript, and/or Python.

    Responsibilities

    - Collaborate with technical leads to identify or clarify end-user requirements and specifications
    - Assist designing algorithms and flowcharts to create the related software programs
    - Write high-quality (i.e., clean and easily maintainable) code to produce a sustainable application development portfolio
    - Practice Test Driven Development
    - Assist with the troubleshooting, debugging, maintaining and improving existing software
    - Develop and improve technical documentation related to the software projects
    - Optimize code and architecture to ensure optimal performance on various devices

    Requirements and skills

    - Bachelor of Science in Computer Science, Computer Engineering, or related field
    - Proven strong programming skills in two or more programming languages such as
    Python, Java, C, C++, Rust, and/or JavaScript
    - Excellent computational problem-solving abilities
    - Experience with and believer of agile development approaches
    - Good understanding of end-to-end application software development, including both front-end and backend
    - Excellent time management skills and the ability to prioritize work
    - Attention to detail and problem-solving skills
    - Excellent written and verbal communication skills
    - Strong organizational skills with the ability to multi-task

    Benefits Summary

    - Our benefits package is designed to reward contribution and loyalty and to attract the kind of talented individuals who have their pick of employers
    - Competitive Base Salary: Compensation aligns with experience and special expertise
    - Stock Options: Option vesting each year over an arranged period, offering a long-term incentive for your contribution to the company’s growth
    - Core Benefits: Comprehensive medical, dental, vision, matching 401K plans, paid holidays, and paid leave, in accordance with state and local law

    For interested applicants, please send your resume and a cover letter to Nicole Campbell at ncampbell@securemicro.com.

  • Sr. Software Engineer

    Secure Micro Technologies, LLC is looking for a Senior Software Engineer to join our downtown Phoenix office. We are a dynamic team looking for an energetic team player to join us. In this role, you will spearhead our efforts to build secure, scalable, and sustainable software architectures ranging from our server-based secure computing solutions to our edge computing embedded firmware. You will be responsible for directing software development projects and overseeing a team of software engineers as they navigate the software development lifecycle for various projects. The right candidate must have excellent written and verbal communication skills, the ability to prioritize tasks, good time-management skills, and experience leading large and complex software projects. In addition, the right candidate must demonstrate extensive programming and software development knowledge and experience.

    Responsibilities

    - Translate business requirements to technical specification and develop software architecture
    - Identify, prioritize, and execute tasks in the secure software development life cycle
    - Develop high-quality software following security best practices from design and implementation to validation and verification
    - Improve existing and develop new software development practices and pipelines
    - Collaborate with management, teams, and customers to fix and improve products
    - Screen, train, and mentor junior software engineers

    Requirements and skills

    - Bachelor of Science or master's in Computer Science, Computer Engineering, or related field
    - Extensive experience in software development, scripting, and project management
    - Extensive knowledge of algorithms, data structures, and system design concepts
    - Fluent with imperative, object-oriented, and/or functional languages
    - Knowledge of cloud/container-based computing, microservices and serverless processing
    - Experience with different compilers and operating systems
    - Strong leadership and mentoring skills
    - Analytical thinking, problem-solving skills, and attention to details
    - Excellent time management skills and the ability to prioritize work
    - Excellent written and verbal communication skills
    - Strong organizational skills with the ability to multi-task

    Benefits Summary

    - Our benefits package is designed to reward contribution and loyalty and to attract the kind of talented individuals who have their pick of employers
    - Competitive Base Salary: Compensation aligns with experience and special expertise
    - Stock Options: Option vesting each year over an arranged period, offering a long-term incentive for your contribution to the company’s growth
    - Core Benefits: Comprehensive medical, dental, vision, matching 401K plans, paid holidays, and paid leave, in accordance with state and local law

    For interested applicants, please send your resume and a cover letter to Nicole Campbell at ncampbell@securemicro.com.

  • Computer Science/Computer Engineering/Electrical Engineering Intern(s)

    Computer Science/Computer Engineering/Electrical Engineering Intern(s). Multiple positions are available.

    Qualifications

    - Junior or Senior Undergraduate, M.S., or Ph.D. students
    - Currently enrolled in studying Computer Science, Computer Engineering, or Electrical Engineering
    - Familiarity with Computer Science or Computer Engineering or Electrical Engineering fundamentals
    - Strong communication and presentation skills
    - Self-motivated and results-oriented
    - Strong problem-solving abilities
    - Analytical and organizational skills
    - Ability to work in a fast-paced environment
    - To conform to U.S. export control regulations

    Responsibilities

    - Assisting in the design, implementation, and testing of real-world secure computer systems solutions
    - Developing software/hardware applications
    - Testing, debugging and documenting these applications
    - Researching, investigating and creating solutions for a wide range of technical issues
    - Proactively learning about new technologies

    For interested applicants, please send your resume and a cover letter to Nicole Campbell at ncampbell@securemicro.com.

Contact Us

Location:

340 E Palm Lane Suite A110, Phoenix, AZ 85004

Call:

+1 602-989-4355

Loading
Your message has been sent. Thank you!