Security Researcher
IND - Bangalore, India
Intel
Stellen Sie KI im vollen Umfang bereit – mit umfassenden Hardware- und Software-Lösungen in der Cloud, in Rechenzentren, am Edge und iClient.
Job Details:
Job Description:
- Responsible for secure design, development and operation of Intel's hardware and software products and services.
- Responsibilities may include threat assessments, design of security components, and vulnerability assessment.
- Ensures products conform to standards and specifications. Develops plans and cost estimates and assesses projects to analyze risks.
- Responds to customer/client requests or events as they occur. Develops solutions to problems utilizing formal education, judgment and formal processes.
- Maintains substantial knowledge of state-of-the-art security principles, theories, attacks and contributes to literature and conferences. May participate in development of intellectual property.
- Requires thorough knowledge of security practices, procedures and capabilities in order to perform nonrepetitive, analytical work.
Qualifications:
- Applicants should ideally possess 10 years of experience in the field of system security. research and excel in exploring software and hardware techniques as a method of attack against targets within computing systems.
- Ability to work autonomously in a less structured startup type environment with minimal supervision is a must.
- Ability to lead a team of security researchers is also a requirement.
- Ability to span security expertise over HW, SW and Firmware domains.
- Passion for understanding latest attacks in the industry and applying to Client platforms where applicable.
- Applicants should have In-depth expertise and experience in four or more of the following areas, including security threats, vulnerability research and security development lifecycle practices:
- Knowledge of computer architecture, CPU, SoC, chipsets, BIOS, Firmware, Drivers, and others
- Security analysis and vulnerability assessment
- Reverse engineering skills
- Exploitation and mitigation technique developments
- Security testing techniques including fuzzing and pen-testing
- Paper publication, participation in bug bounty programs, recognitions from products and brands will be highly considered.
- Expertise in strategizing advanced product security counter measures is valuable.
- Security Research and industry test tools and standards like Kali Linux, Defensics, Hydra, BurpSuite, Metasploit, OWASP
Additional qualifications - good to have one or more: - Knowledge of security technologies: authentication, cryptography, security protocols
- Strong network in security community, ethical hackers, academia,
CISSP and other security certifications - Demonstrable knowledgeable in one or more OS internals - Linux, Windows, macOS, mobile OS etc
- Knowledgeable in one or more programming languages including low level assembly, C, Java, Python etc.
- Detail oriented and ability to compare and contrast features across multiple processor architectures and low level micro architectural blocks.
- Knowledgeable in networking basics
- Knowledge in Side Channel Analysis, Timing attacks, glitch attacks etc
- White papers, Academic references or industry accolades for demonstrated expertise, discovered vulnerabilities
- Specialization in one or more security domains
- Having worked on security test tooling and methodologies
Job Type:
Experienced HireShift:
Shift 1 (India)Primary Location:
India, BangaloreAdditional Locations:
Business group:
The Client Computing Group (CCG) is responsible for driving business strategy and product development for Intel's PC products and platforms, spanning form factors such as notebooks, desktops, 2 in 1s, all in ones. Working with our partners across the industry, we intend to deliver purposeful computing experiences that unlock people's potential - allowing each person use our products to focus, create and connect in ways that matter most to them. As the largest business unit at Intel, CCG is investing more heavily in the PC, ramping its capabilities even more aggressively, and designing the PC experience even more deliberately, including delivering a predictable cadence of leadership products. As a result, we are able to fuel innovation across Intel, providing an important source of IP and scale, as well as help the company deliver on its purpose of enriching the lives of every person on earth.Posting Statement:
All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance.Position of Trust
N/AWork Model for this Role
This role will require an on-site presence. * Job posting details (such as work model, location or time type) are subject to change.* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
4
0
0
Category:
Research Jobs
Tags: Burp Suite C CISSP Cryptography Java Kali Linux MacOS Metasploit OWASP Product security Python Reverse engineering Security analysis SOC Strategy Vulnerabilities Windows
Perks/benefits: Conferences Startup environment Team events
Region:
Asia/Pacific
Country:
India
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Senior Cybersecurity Engineer jobsInformation System Security Officer jobsIT Security Analyst jobsSenior Security Analyst jobsSenior Information Security Analyst jobsSecurity Operations Engineer jobsSenior Cloud Security Engineer jobsCyber Security Specialist jobsInformation Security Manager jobsSenior Product Security Engineer jobsSenior Network Security Engineer jobsInformation System Security Officer (ISSO) jobsSenior Information Security Engineer jobsSenior Cyber Security Engineer jobsSecurity Consultant jobsChief Information Security Officer jobsInformation Systems Security Engineer jobsSecurity Specialist jobsNetwork Engineer jobsCyber Threat Intelligence Analyst jobsSenior Software Engineer jobsIT Security Engineer jobsSecurity Operations Analyst jobsCybersecurity Specialist jobsSenior IT Auditor jobs
GDPR jobsSecurity assessment jobsEDR jobsTS/SCI jobsEncryption jobsSDLC jobsThreat detection jobsRMF jobsMalware jobsTerraform jobsSplunk jobsSQL jobsIDS jobsITIL jobsFinance jobsCompTIA jobsOWASP jobsTop Secret jobsIPS jobsForensics jobsSOC 2 jobsActive Directory jobsDocker jobsGIAC jobsClearance Required jobs
TCP/IP jobsOSCP jobsCRISC jobsHIPAA jobsMITRE ATT&CK jobsDoDD 8570 jobsIntrusion detection jobsAnsible jobsVPN jobsCCSP jobsZero Trust jobsJavaScript jobsSOAR jobsJira jobsDNS jobsUNIX jobsIT infrastructure jobsData Analytics jobsIndustrial jobsSOX jobsBanking jobsNIST 800-53 jobsKPIs jobsGCIH jobsSANS jobs