Apply Now    
Job ID: JR0011334
Job Category: Information Technology
Primary Location: San Jose, H CR
Other Locations:
Job Type: Experienced Hire

Information Security Technical Lead

Job Description

Responsible for the development and/or enforcement of corporate and business group information security policies to protect Intel's information assets and intellectual property.May participate in the planning, direction or coordination of crosscorporate, civil, and criminal investigations involving Intel's information assets and intellectual property in conjunction with law enforcement agencies. Lead or contribute to security risk assessments which determine threats, consequences, and vulnerabilities to business unit key assets, products, and services. Participate in the planning and direction of security risk assessments to examine and verify security capabilities, behaviors, and controls for authentication, authorization, integrity, availability, assurance, audit, and disposal of Intel's information assets to determine exposure and compliance levels. Develop and lead corporate level information security awareness and training programs. Research and develop security technologies for the corporation. Determine sources of requirements and standards for compliance. May monitor, audit, or executes security controls and tools on one or more of Intel's computing and communications environments and/or enterprise applications such as SAP to ensure business acceptable exposure levels to Intel's information assets and intellectual property on those systems. Recommends and drives additional security controls to meet current and future needs. Create designs/technical specifications that align business needs with technical solutions while considering emerging security technologies. Drive the development of security capabilities within the security industry and Intel. May be engaged in other information security or risk management projects. Requires thorough knowledge of security practices, procedures, and capabilities in order to perform nonrepetitive, analytical work. Provides solutions to a wide range of difficult problems. Skills and experience required includes a BS in CS, CE, IT, Sys IE, or EE Thorough understanding of the Information Security Common Body's of Knowledge CISSP or equivalent Certification required.


-Should have at least a technical bachelor's degree in related field and 3-5 years of experience in an NOC/SOC environment.-Significant knowledge of particular CND tools, tactics, techniques and procedures which support their analysis of event information.-Ability to perform analysis of log files from a variety of sources within the Network Environment or DMZ including host logs, network traffic logs, firewall logs and IDS system logs. -Experience in monitoring external data sources to maintain currency of CND threat conditions and determine which security issues may have an impact on the Network Environment. -Experience in performing event correlation using information gathered from a variety of sources within the network environment to gain situational awareness and determine the effectiveness of an observed attack. -Demonstrated understanding of platform security fundamentals Hardware, Windows, and Linux. Must be willing to write scripts using languages as Python and/or PowerShell -Strong analytical and critical thinking skills as well as English skills at an intermediate to advanced level both written and spoken with strong communication skills are a must.-Experience in Cloud Security and Penetration testing-This person must be willing to manage personal performance, with a highly action orientation attitude and willing to resolve complex problems.-Been willing to partnering with another business groups, L3, engineers and a wide range of stakeholders.

Other preferred Requirements: -GSEC, GCIH, GCIA, GNFA, SANS certifications are preferred.-McAfee Certified Product Specialist SIEM certification or its equivalent in experience is a strong plus-Certified Ethical Hacker knowledge is a strong plus.-CISM is highly desired-Understanding of web application threats and penetration testing concepts.-Ability to conduct research, analysis and correlation across a wide variety of all source data sets.

Inside this Business Group

Intel's Information Technology Group (IT) designs, deploys and supports the information technology architecture and hardware/software applications for Intel. This includes the LAN, WAN, telephony, data centers, client PCs, backup and restore, and enterprise applications. IT is also responsible for e-Commerce development, data hosting and delivery of Web content and services.

Apply Now    

What would you like to do now?

Connect with Us

Get Job Alerts

Get started
Student Center

Find out more about working at Intel

Learn more
Hiring Process

Hiring Process

Learn more

Grow your network of opportunities