
Job description
Huawei Canada has an immediate 12-month contract opening for an Engineer.
About the team:
The Data and Privacy Protection Technology Lab is dedicated to ensuring user data flows while maintaining privacy. Researchers focus on key areas such as user identity authentication, data integrity, privacy protection, extensive model privacy assessment, multi-modal data identification, differential privacy, and federated learning. The lab supports deep research and encourages publications in leading journals. Research outcomes are applied across various Huawei product lines, including mobile phones, smart devices, and communications technologies.
About the job:
Participate to the research of AI agent security architecture and technology design in endpoint devices.
Participate to the proposing, designing and prototyping of innovative AI Agent security and privacy protection technologies for Huawei Endpoint products.
Producing insights of technology development in both academia and industry.
Work closely with other research labs worldwide and product team to optimize the solution and deliver concrete impact to real products.
Job requirements
About the ideal candidate:
PhD Degree in Computer Science or Computer Engineering, or Master Degree with 4+ years experiences in related fields.
Proven proficiency in at least one of the following programming languages: C++/C, Java, Python.
Deep understanding of popular AI Agent frameworks such as LangGraph, AutoGen, etc.
Deep understanding of at least one of the following security and privacy protection technologies in AI Agent protection: identity and access control, contextual integrity, data poisoning prevention, prompt inject prevention, model stealing attack and defense, task safety protection, hallucination suppression.
Demonstrated experiences of designing and developing security and privacy protection solutions for AI systems. Direct experience on AI Agent development is an asset.
Good understanding of security concepts is an asset: symmetric-key cryptography (block ciphers, MAC, and authenticated encryption), public key cryptography (digital signatures, encryption, and key establishment).
or
All done!
Your application has been successfully submitted!