The DPG DPEA Security Assurance and Research team leads security compliance, governance and research work for all Xeon platforms. This position requires a hacker mindset, the ability to learn new knowledge domains quickly, deep technological understanding, and the ability to identify flaws and vulnerabilities in complex secure systems
In this hands-on position, you will :
1) Develop and implement advanced code analysis, fuzzing and Pen Testing techniques and tools. You will work closely with architects, developers, and test engineers to ensure product security and design solutions.
2) Responsibilities may include threat assessments, design of security components, vulnerability assessment and ensuring products conform to standards and specifications
3) Taking an active role in complex, multidisciplinary security research projects
4) Explore and invent software and hardware techniques as a method of attack against compute targets
5) Develop proof of concepts to characterize exploitability and impacts
6) Lead automation pathfinding to improve security assurance capabilities of product teams
7) Share expert insights and new learning and contributes intellectual property to internal and external communities
8) Apply hackers skills throughout the whole product development process starting from security design reviews, simulation and emulation to reference platforms.
9) Paper publications, participation in bug bounty programs
Candidate must have a Masters degree or higher in Electrical/Computer Engineering or Computer Science with knowledge of Computer architecture with 10+ years of relevant experience. GFX, CPU design, SoC layout, chipset functionality, BIOS, Firmware, Drivers, and Data Centric use cases. Should have ability to span security expertise over HW, SW and Firmware domains. Must have passion for security research and community impact, demonstrated by published research and collaboration to community efforts
Knowledge on below domains is required :
� Security threats, vulnerability research along with practicing security development lifecycle practices.
� Authentication, cryptography, secure protocols
� Security code review, analysis, and vulnerability assessment
� Exploitation and mitigation technique developments
� Security testing techniques including fuzzing and pen-testing
� Security Research and industry test tools/standards like Kali Linux, Defensics, Hydra, BurpSuite, Metasploit, OWASP
� Knowledge in Side Channel Analysis, Timing attacks, glitch attacks etc
The Data Center Group (DCG) is at the heart of Intel’s transformation from a PC company to a company that runs the cloud and billions of smart, connected computing devices. The data center is the underpinning for every data-driven service, from artificial intelligence to 5G to high-performance computing, and DCG delivers the products and technologies—spanning software, processors, storage, I/O, and networking solutions—that fuel cloud, communications, enterprise, and government data centers around the world.