Responsible for secure design, development and operation of Intel's hardware and software products and services. Responsibilities may include threat assessments, design of security components, and vulnerability assessment.
Ensures products conform to standards and specifications. Develops plans and cost estimates and assesses projects to analyze risks.
Responds to customer / client requests or events as they occur. Develops solutions to problems utilizing formal education, judgment and formal processes.
Maintains substantial knowledge of stateoftheart security principles, theories, attacks and contributes to literature and conferences.
May participate in development of intellectual property. Requires thorough knowledge of security practices, procedures and capabilities in order to perform nonrepetitive, analytical work.
Applicants should ideally possess 10 years of experience in the field of system security research and excel in exploring software and hardware techniques as a method of attack against targets within computing systems.
Ability to work autonomously in a less structured startup type environment with minimal supervision is a must.Ability to lead a team of security researchers is also a requirement.
Ability to span security expertise over HW, SW and Firmware domains.Passion for understanding latest attacks in the industry and applying to Client platforms where applicable.
Applicants should have In-depth expertise and experience in four or more of the following areas, including security threats, vulnerability research and security development lifecycle practices : Knowledge of computer architecture, CPU, SoC, chipsets, BIOS, Firmware, Drivers, and othersSecurity analysis and vulnerability assessmentReverse engineering skillsExploitation and mitigation technique developmentsSecurity testing techniques including fuzzing and pen-testingPaper publication, participation in bug bounty programs, recognitions from products & brands will be highly considered.
Expertise in strategizing advanced product security counter measures is valuable.Security Research and industry test tools / standards like Kali Linux, Defensics, Hydra, BurpSuite, Metasploit, OWASPAdditional qualifications (good to have one or more) : Knowledge of security technologies : authentication, cryptography, security protocolsStrong network in security community, ethical hackers, academia,CISSP and / or other security certificationsDemonstrable knowledgeable in one or more OS internals - Linux, Windows, macOS, mobile OS etcKnowledgeable in one or more programming languages including low level assembly, C, Java, Python etc.
Detail oriented and ability to compare and contrast features across multiple processor architectures and low level micro architectural blocks.
Knowledgeable in networking basicsKnowledge in Side Channel Analysis, Timing attacks, glitch attacks etc White papers, Academic references or industry accolades for demonstrated expertise, discovered vulnerabilitiesSpecialization in one or more security domainsHaving worked on security test tooling and / or methodologies