EV Battery CAN Protocol Hacker bei Allye Energy
Allye Energy · London, Vereinigtes Königreich · Onsite
- Professional
- Optionales Büro in London
Allye Energy is revolutionising the energy storage sector with our cutting-edge Battery Energy Storage Systems (BESS) built using repurposed EV batteries. As part of our innovative approach to sustainable energy solutions, we are expanding our capabilities to integrate DC fast charging technology with our battery energy storage systems, creating a comprehensive energy ecosystem for the future of clean mobility and energy storage.
Job Description:We need a 'hacker' - someone with the rare combination of automotive cybersecurity skills, embedded systems expertise, and the tenacity to reverse engineer complex CAN protocols. You'll be breaking our dependence on black-box third-party controllers by developing our own in-house solutions that work across multiple EV platforms from leading manufacturers.
Responsibilities
Reverse Engineering & Protocol Analysis
- Reverse engineer CAN bus protocols for leading EV manufacturer battery platforms
- Decode and create DBC files from scratch through systematic CAN logging and signal analysis
- Develop control code to mimic vehicle CAN messages to satisfy battery BMS requirements
- Identify critical BMS control signals across multiple OEM platforms without access to proprietary documentation
Controller Development
- Design and implement multi-platform battery controllers using ESP32/STM32 microcontrollers
- Create embedded C/C++ firmware for automotive-grade CAN communication
- Develop Python-based analysis tools for automated CAN protocol discovery
- Build hardware prototypes integrating CAN transceivers, safety systems, and monitoring interfaces
Cross-Platform Integration
- Establish communication protocols that work seamlessly across Tesla and other major EV battery architectures
- Handle complex multi-bus scenarios (PCAN, BCAN, diagnostic CAN) found in modern EVs
- Implement safety-critical messaging for battery thermal management, balancing, and protection systems
- Create unified software architectures that abstract OEM-specific differences
Testing & Validation
- Develop comprehensive test suites for battery controller validation across all target platforms
- Perform real-world testing with actual EV battery packs in controlled environments
- Create automated testing frameworks using CANoe, SavvyCAN, or custom tooling
- Document reverse engineering methodologies for knowledge transfer and future platform additions
Essential Technical Skills
- Proven CAN bus reverse engineering experience - Show us your GitHub repos, DBC files, or published research
- Embedded systems programming in C/C++ for automotive microcontrollers (ESP32, STM32, etc.)
- Python scripting for CAN analysis, data processing, and automation
- Automotive protocol expertise - CAN, UDS, OBD2, J1939, ISO-TP
- Hardware debugging skills with oscilloscopes, logic analysers, and professional CAN tools
Highly Desirable Experience
- Tesla CAN protocol knowledge - Model 3/Y communication patterns
- Modern EV platform experience across leading manufacturers and latest battery technologies
- BMS integration experience with lithium-ion battery systems
- Automotive cybersecurity background - penetration testing, vulnerability research
- Open source contributions to vehicle security or CAN analysis projects
The Ideal Candidate Profile
- Security researcher with published automotive vulnerabilities or conference presentations
- Open source developer with significant stars/forks on automotive projects
- Academic researcher with papers on CAN reverse engineering or automotive cybersecurity
- Startup engineer from EV conversion companies or battery management firms
Personal Attributes
- Obsessive problem-solver who won't give up on complex reverse engineering challenges
- Self-directed researcher comfortable working with minimal documentation
- Safety-conscious engineer understanding the critical nature of battery management systems
- Team collaborator who can explain complex technical concepts to non-specialists
- Continuous learner staying current with evolving EV technologies and security research
Additional Information:
Application Requirements
We want to see evidence of your capabilities:
- Portfolio of reverse engineering work - GitHub repositories, published DBC files, research papers
- Technical writeups demonstrating your approach to complex problems
- Video demonstrations of working CAN analysis or battery integration projects
- Conference presentations or blog posts about automotive security research
- Academic publications in automotive cybersecurity or embedded systems
Bonus points for:
- Contributions to open source CAN tools (SavvyCAN, CANToolz, etc.)
- Tesla or other major EV manufacturer CAN documentation or working controller implementations
- Published vulnerabilities in automotive systems
- Working relationships with the automotive security community
- Experience with second-life battery projects or energy storage systems
Strictly No Agencies
Jetzt bewerben