IOT Embedded Linux Engineer

Augury Augury · Vertical AI · Augury, Israel · R&D

Augury is a leader in Industrial AI, transforming how people and machines work together to drive efficiency in manufacturing. They are seeking an IoT Embedded Linux Engineer to design, build, and own the software stack for their edge devices, focusing on resilient Linux systems, secure cloud connectivity, and production-ready device delivery at scale.

What you'd actually do

  1. Own the embedded Linux platform: BSP, kernel configuration, device tree, bootloaders (e.g., U-Boot), systemd services, and startup/upgrade flows.
  2. Develop user-space applications using object-oriented principles (C++/Go/Rust/Similar) to implement core device logic and features, leveraging available libraries and frameworks.
  3. Build production images using Yocto or Buildroot, manage layers/recipes, and maintain reproducible builds for multiple hardware variants.
  4. Implement secure OTA updates (e.g., Mender, RAUC, SWUpdate), with A/B partitions, rollback, and signing—targeting zero‑touch fleet upgrades.
  5. Harden devices for security: filesystem permissions, sandboxing (e.g., AppArmor/SELinux), secure boot/TPM, key management, CVE tracking, and update policies.

Skills

Required

  • Embedded Linux experience shipping devices to production at scale
  • object-oriented programming (OOP) principles
  • multi-threading
  • C/C++/GO/Rust/Similar in user space
  • scripting (Bash, Python)
  • CMake/Make, BitBake
  • Buildroot or Yocto Project
  • Linux kernel basics
  • device trees
  • drivers/BSP integration
  • bootloaders (U-Boot)
  • systemd service design
  • TCP/IP
  • DHCP/DNS
  • TLS
  • MQTT/HTTPS
  • VPN
  • Wi-Fi/cellular modules and AT command stacks
  • OTA frameworks
  • partitioning strategies
  • rollback-safe update flows
  • Git
  • CI (GitHub Actions, GitLab CI or similar)
  • cross builds
  • test automation
  • BSc in EE/CE/CS (or equivalent practical experience)

Nice to have

  • secure boot
  • TPM
  • disk encryption
  • SBOM/CVE remediation workflows
  • PREEMPT_RT
  • scheduling
  • latency tuning
  • power management
  • containers (Docker/Podman) on ARM
  • OCI/CRUN
  • rootless strategies
  • AWS IoT/Azure IoT
  • device identity/provisioning
  • fleet management tooling
  • Go or Rust for system services
  • protobuf/gRPC
  • factory provisioning
  • E2E traceability
  • end-of-line testing

What the JD emphasized

  • Embedded Linux
  • C/C++/GO/Rust/Similar
  • Buildroot or Yocto Project
  • Linux kernel basics
  • TCP/IP
  • OTA frameworks