Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Bangalore |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | IT - Software |
Functional Area | IT Operations / EDP / MISSecurity Services |
EmploymentType | Full-time |
Debugs software products through the use of systematic tests to develop, apply, and maintain quality standards for company products. Develops, modifies, and executes software test plans. Analyzes and writes test standards and procedures. Maintains documentation of test results to assist in debugging and modification of software. Analyzes test results to ensure correct functionality, determine root causes of failures and recommends corrective action. Consults with development engineers in resolution of problems. Provides feedback in preparation of technical appraisals of programming languages, systems, and computation software.QualificationsApplicants should ideally possess ~3-6 years of experience in the field of system security research and excel in exploring software and hardware techniques as a method of attack against targets within computing systems.Ability to work autonomously in a less structured startup type environment with minimal supervision is a must.Ability to lead a team of security researchers is also a requirement. Ability to span security expertise over HW, SW and Firmware domains.Passion for understanding latest attacks in the industry and applying to Client platforms where applicable.Applicants should have In-depth expertise and experience in four or more of the following areas, including security threats, vulnerability research and security development lifecycle practices:Knowledge of computer architecture, CPU, SoC, chipsets, BIOS, Firmware, Drivers, and othersSecurity analysis and vulnerability assessmentReverse engineering skillsExploitation and mitigation technique developmentsSecurity testing techniques including fuzzing and pen-testingPaper publication, participation in bug bounty programs, recognitions from products & brands will be highly considered.Expertise in strategizing advanced product security counter measures is valuable.Security Research and industry test tools/standards like Kali Linux, Defensics, Hydra, BurpSuite, Metasploit, OWASPAdditional qualifications (good to have one or more):Knowledge of security technologies: authentication, cryptography, security protocolsStrong network in security community, ethical hackers, academia,CISSP and/or other security certificationsDemonstrable knowledgeable in one or more OS internals - Linux, Windows, macOS, mobile OS etcKnowledgeable in one or more programming languages including low level assembly, C, Java, Python etc.Detail oriented and ability to compare and contrast features across multiple processor architectures and low level micro architectural blocks.Knowledgeable in networking basicsKnowledge in Side Channel Analysis, Timing attacks, glitch attacks etc White papers, Academic references or industry accolades for demonstrated expertise, discovered vulnerabilitiesSpecialization in one or more security domainsHaving worked on security test tooling and/or methodologiesInside this Business GroupThe Client Computing Group is responsible for all aspects of the client computing business across Phone, Phablet, Tablet and PC platforms, leading Intels efforts to transform client computing through technologies, new form factors, and driving Intels corporate-wide user experience initiatives. This spans all client device brands including hardware, software and connectivity ingredients for phones, tablets, Ultrabook , All-in-Ones, 2 in 1 computing devices, and home gateways.,
Keyskills :
environmental impact assessmentos internals user experienceproduct security quality standardssecurity research computer architect