Responsible for secure design, development and operation of Intel’s hardware and software products and services. Responsibilities may include threat assessments, design of security components, and vulnerability assessment. Ensures products conform to standards and specifications. Develops plans and cost estimates and assesses projects to analyze risks. Responds to customer/client requests or events as they occur. Develops solutions to problems utilizing formal education, judgment and formal processes. Maintains substantial knowledge of stateoftheart security principles, theories, attacks and contributes to literature and conferences. May participate in development of intellectual property. Requires thorough knowledge of security practices, procedures and capabilities in order to perform nonrepetitive, analytical work.
Qualifications
Applicants should ideally possess 10 years of experience in the field of system security research and excel in exploring software and hardware techniques as a method of attack against targets within computing systems. Ability to work autonomously in a less structured startup type environment with minimal supervision is a must. Ability to lead a team of security researchers is also a requirement. Ability to span security expertise over HW, SW and Firmware domains. Passion for understanding latest attacks in the industry and applying to Client platforms where applicable. Applicants should have In-depth expertise and experience in four or more of the following areas, including security threats, vulnerability research and security development lifecycle practices: Knowledge of computer architecture, CPU, SoC, chipsets, BIOS, Firmware, Drivers, and others Security analysis and vulnerability assessment Reverse engineering skills Exploitation and mitigation technique developments Security testing techniques including fuzzing and pen-testing Paper publication, participation in bug bounty programs, recognitions from products & brands will be highly considered. Expertise in strategizing advanced product security counter measures is valuable. Security Research and industry test tools/standards like Kali Linux, Defensics, Hydra, BurpSuite, Metasploit, OWASP Additional qualifications (good to have one or more): Knowledge of security technologies: authentication, cryptography, security protocols Strong network in security community, ethical hackers, academia, CISSP and/or other security certifications Demonstrable knowledgeable in one or more OS internals – Linux, Windows, macOS, mobile OS etc Knowledgeable in one or more programming languages including low level assembly, C, Java, Python etc. Detail oriented and ability to compare and contrast features across multiple processor architectures and low level micro architectural blocks. Knowledgeable in networking basics Knowledge in Side Channel Analysis, Timing attacks, glitch attacks etc White papers, Academic references or industry accolades for demonstrated expertise, discovered vulnerabilities Specialization in one or more security domains Having worked on security test tooling and/or methodologies Inside this Business Group
The Client Computing Group (CCG) is responsible for driving business strategy and product development for Intel’s PC products and platforms, spanning form factors such as notebooks, desktops, 2 in 1s, all in ones. Working with our partners across the industry, we intend to continue to advance PC experiences to deliver the real-world performance people demand. As the largest business unit at Intel, CCG is investing more heavily in the PC, ramping its capabilities even more aggressively, and designing the PC experience even more deliberately, including delivering a predictable cadence of leadership products. As a result, we are able to fuel innovation across Intel, providing an important source of IP and scale, as well as help the company deliver on its purpose of enriching the lives of every person on earth.
Legal Disclaimer: Intel prohibits discrimination based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status. It has come to our notice that some people have received fake job interview letters ostensibly issued by Intel, inviting them to attend interviews in Intel’s offices for various positions and further requiring them to deposit money to be eligible for the interviews. We wish to bring to your notice that these letters are not issued by Intel or any of its authorized representatives. Hiring at Intel is based purely on merit and Intel does not ask or require candidates to deposit any money. We would urge people interested in working for Intel, to apply directly at www.jobs.intel.com and not fall prey to unscrupulous elements.
Job Description We are Hiring for PAN india.r r Our Company is looking out for young and energetic talents to...
Apply For This JobContent | Remote | Part-Time Offered Salary : 20k/month About Us We at JumpingMinds.ai, are building India’s Largest Mental Health...
Apply For This Jobbr{display:none;}.css-58vpdc ul > li{margin-left:0;}.css-58vpdc li{padding:0;}]]> Skilled and experienced Civil Engineer required for the management of fast-paced industrial construction projects. Educational...
Apply For This JobFull Job Description Administration OfficerJob descriptionTrainer Required for Admin Officer in Skill development-The role of trainer is to train candidates...
Apply For This JobJob Description Excellent IT skills.Exceptional creative flair and design.Excellent time management and organizational skills.Accuracy and attention to detail.An understanding of...
Apply For This JobJob Description Additional Location(s): N/ADiversity – Innovation – Caring – Global Collaboration – Winning Spirit – High PerformanceAt Boston Scientific,...
Apply For This Job