Job Description Intel Security Center of Excellence aims to improve the security of computing platforms across the world by conducting in-depth security research. If you are a seasoned vulnerability and threat research expert that craves for tons of fun and pride in raising the security bar for ubiquitous computing systems including Cloud, Network, IOT, Drones, VR, Phones, Tablets, Laptops, we would like you to join and be a proud member of our Advanced Security Research Team. Through your vulnerability analysis and mitigation development skills, you will influence and work on the security of a variety of Hardware, Firmware, Software and Systems Technologies in these exciting product lines.Responsibilities may include threat assessment, design of security components, vulnerability assessment. Ensures products conform to standards and specifications. Develops plans and cost estimates and assesses projects to analyze risks. Responds to customer/client requests or events as they occur. Develops solutions to problems utilizing formal education, judgment and formal process. Maintains substantial knowledge of state-of-the-art security principles, theories, attacks and contributes to literate and conferences. May participate in development or intellectual property. Requires thorough knowledge of security practices, procedures and capabilities in order to perform non-repetitive, analytical work.
Applicants should possess at least 8-10 years of experience in the field of system security and, specifically, with experience of performing hardware/firmware/software security audits. Ability to work independently with minimal supervision is a must. Ability to lead a team of security researchers is also a requirement. Ability to span security expertise over HW, SW and Firmware domains.Passion for the latest gadgets and building security into these gadgets.Ability to work autonomously in a less structure startup type environment. Applicants should have expertise or experience in four or more of the following areas:In-depth experience with security threats, vulnerability research along with practicing security development lifecycle practices.Threat modelingSecurity code review, analysis and vulnerability assessmentReverse engineering skillsExploitation and mitigation technique developmentsSecurity testing techniques including fuzzing and pen-testing.Expertise in architecting, strategizing and evangelizing advanced product security architecture into the product development lifecycleAdditional qualifications:Knowledge of security technologies: authentication, cryptography, secure protocolKnowledge of computer architecture CPU, SoC, chipsets, BIOS, Firmware, Drivers, and othersStrong network in security community CISSP and/or other security certifications