The IT Information Security organization has a unique opportunity in the Data Risk Management team that will allow you to exercise your creativity and make a difference in the security of Intel’s sensitive information The selected candidate will be expected to research and analyze risks associated with protection of sensitive information throughout its lifecycle – from creation through disposal - for a wide range of devices and environments, particularly cloud-based solutions. The scope includes staying current with latest vulnerabilities and exploits, reviewing processes for intellectual property security and devising and testing controls. Coverage includes internal and external enterprise and mobile environments and support of new technologies and their integration into the security portfolio. Based on risk reviews, the candidate will prioritize risk findings and work with customers, developers and support organizations to provide guidance for improving security controls around sensitive information A more experienced candidate will be expected to drive parts of the security strategy and partner with customer groups and security engineering to achieve successful implementations of strategic controls and their widespread adoption within the enterprise. Also, participating in the IT@Intel program is encouraged, allowing the candidate external security influence. You will become a subject matter expert whose opinion is sought by IT organizations and Intel product groups
Inside this Business Group
Intel's Information Technology Group (IT) designs, deploys and supports the information technology architecture and hardware/software applications for Intel. This includes the LAN, WAN, telephony, data centers, client PCs, backup and restore, and enterprise applications. IT is also responsible for e-Commerce development, data hosting and delivery of Web content and services.
Arizona, Phoenix; California, Folsom;