Cybersecurity Application (ÀÓº£µðµå) SW Engineer (»ç¿ø-°úÀå±Þ)
¸ðÁýºÎ¹® ¹× ÀÚ°Ý¿ä°Ç
´ã´ç¾÷¹« | ÀÚ°Ý¿ä°Ç | Àοø |
---|---|---|
¤ýCyber Security Solution ¹× Application Áö¿ø ¤ý±Û·Î¹ú ¿£Áö´Ï¾î¸µ ÆÀ°ú Çù·Â (APEC Áö¿ª)
|
¤ýÀ¯°ü °æ·Â 3³â ÀÌ»ó ¤ýEmbedded System °æÇè (Trace32, UDE, GDB) ¤ýC-ÇÁ·Î±×·¡¹Ö ¿ª·® ¤ýSW ¼º´É Æò°¡ °æÇè ¹× ÀÌÇØµµ (perf, oprofile) ¤ýºñÁî´Ï½º ¿µ¾î °¡´ÉÀÚ ¤ý¹®Á¦ ÇØ°á ¹× Çù¾÷ ´É·Â [¿ì´ë»çÇ×] ¤ýCyber Security Áö½Ä/ ¾÷¹« °æÇè (authentication, encryption, symmetric and asymmetric keys, key management µî) ¤ýÀÚµ¿Â÷ ¼ÒÇÁÆ®¿þ¾î °³¹ß/ °ËÁõ °æÇè ¤ýAUTOSAR °æÇè ¤ýISO26262 (ÀÚµ¿Â÷±â´É¾ÈÀü) / ISO/SAE21434 (ÀÚµ¿Â÷»çÀ̹ö º¸¾È) ÀÌÇØµµ |
0 ¸í |
±Ù¹«Á¶°Ç
ÀüÇü´Ü°è ¹× Á¦Ãâ¼·ù
Á¢¼ö¹æ¹ý
ä¿ë½Ã
±âŸ À¯ÀÇ»çÇ×