Do you like researching the evolving security threat landscape, discovering new hardware vulnerabilities, developing PoCs (Proof of Concepts) to characterize exploitability and recommending robust mitigations to address them? If so, Intel's Xeon & Networking Engineering (XNE) group is looking for a hands-on hardware security researcher to drive offensive research activities across our product line.
In this role responsibilities include, although not limited to:
Proactive research driven by emerging threat/attack trends in key areas like Secure Boot, 5G and SCA (Side Channel Attacks)
Reactive research triggered by external reports against our products
Performing security threat models
Conducting security code reviews to ensure implementation matches security objectives
Red teaming and leading hackathons for high risk areas
Mentoring and coaching less experienced team members
In addition to the qualifications listed below, the ideal candidate will also have:
Excellent communication and documentation skills
You will become part of a company which continues to change the world through its brilliant people. To reward the amazing contributions of our people we offer a market competitive compensation & benefits package including plenty of family and flexible work benefits (i.e. the opportunity for part time home office work), programs that focus on your health and wellbeing, many development opportunities and enough time to relax, re-charge and retreat.
We believe in flexible working models. Intel is an equal opportunity employer.
Qualifications
You must possess the below minimum qualifications to be initially considered for this position. Preferred qualifications are in addition to the minimum requirements and are considered a plus factor in identifying top candidates.
Minimum Qualifications:
The candidate must have a Bachelor's degree in Computer Engineering, Electrical Engineering or Computer Science and 8+ years of experience in the industry.
6+ years of experience in:
Security related field
Vulnerability research, exploit development and responsible disclosure
Computer systems architecture, CPU, SoC, chipsets, BIOS, Firmware, Drivers
Programming proficiency across languages: System Verilog, C/C++, Python/Perl scripting, etc.
Work in an unstructured start-up like environment with minimal supervision
Preferred Qualifications:
Experience in:
Security research team lead or engineering team lead
Pre-si simulation, emulation and/or formal validation
Security Development Lifecycle (SDL)
Xeon and Networking Engineering (XNE) focuses on the development and integration of XEON and Networking SOC's and critical IP's sustain Intels Xeon and 5G networking roadmap.
Other Locations
Germany, Munich
Work Model for this Role
This role is available as fully home-based and generally would require you to attend Intel sites only occasionally based on business need.
Get email alerts for the latest"Hardware Offensive Security Researcher and Red Team Lead (f/m/d) jobs in Karlsruhe"
