GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET
The IT Information Security organization has a unique opportunity in the Data Risk Management team that will allow you to exercise your creativity and make a difference in the security of Intel’s sensitive information
The selected candidate will be expected to research and analyze risks associated with protection of sensitive information throughout its lifecycle – from creation through disposal – for a wide range of devices and environments, particularly cloud-based solutions. The scope includes staying current with latest vulnerabilities and exploits, reviewing processes for intellectual property security and devising and testing controls. Coverage includes internal and external enterprise and mobile environments and support of new technologies and their integration into the security portfolio. Based on risk reviews, the candidate will prioritize risk findings and work with customers, developers and support organizations to provide guidance for improving security controls around sensitive information
A more experienced candidate will be expected to drive parts of the security strategy and partner with customer groups and security engineering to achieve successful implementations of strategic controls and their widespread adoption within the enterprise. Also, participating in the [email protected] program is encouraged, allowing the candidate external security influence. You will become a subject matter expert whose opinion is sought by IT organizations and Intel product groups
The selected candidate must have basic mastery of information security specialist competencies and be able to research and develop solutions to complex and sensitive information security, risk, controls and privacy issues.
Also required is experience with software testing and knowledge of data protection security principles, best practices, web application threats and effective information security controls. Demonstrated understanding of platform security fundamentals (hardware plus Windows, Linux, IOS and Android), including ability to design end-to-end security validation plans, perform threat modeling, fuzz testing, and code reviews.
Skills in network engineering/troubleshooting, remote connectivity and databases are highly desirable.
The candidate must have strong customer orientation while ensuring information risk management processes are followed.
Candidates must be effective communicators and must be comfortable working with Intel employees and managers at many levels.
The candidate should have a technical bachelor’s degree and 6 years of experience, or equivalent (GSEC and CISSP certifications preferred).
USA-California, Folsom, USA-Arizona, Phoenix
Intel prohibits discrimination based on race, color, religion, gender, national origin, age, disability, veteran status, marital status, pregnancy, gender expression or identity, sexual orientation or any other legally protected status.