Responsible for the development and/or enforcement of corporate and business group information security policies to protect Intel's information assets and intellectual property. May participate in the planning, direction or coordination of crosscorporate, civil, and criminal investigations involving Intel's information assets and intellectual property in conjunction with law enforcement agencies. Lead or contribute to security risk assessments which determine threats, consequences, and vulnerabilities to business unit key assets, products, and services. Participate in the planning and direction of security risk assessments to examine and verify security capabilities, behaviors, and controls for authentication, authorization, integrity, availability, assurance, audit, and disposal of Intel's information assets to determine exposure and compliance levels. Develop and lead corporate level information security awareness and training programs. Research and develop security technologies for the corporation. Determine sources of requirements and standards for compliance. May monitor, audit, or executes security controls and tools on one or more of Intel's computing and communications environments and/or enterprise applications such as SAP to ensure business acceptable exposure levels to Intel's information assets and intellectual property on those systems. Recommends and drives additional security controls to meet current and future needs. Create designs/technical specifications that align business needs with technical solutions while considering emerging security technologies. Drive the development of security capabilities within the security industry and Intel. May be engaged in other information security or risk management projects. Requires thorough knowledge of security practices, procedures, and capabilities in order to perform nonrepetitive, analytical work. Provides solutions to a wide range of difficult problems. Skills and experience required includes a BS in CS, CE, IT, Sys IE, or EE Thorough understanding of the Information Security Common Body's of Knowledge CISSP or equivalent Certification required.
Inside this Business Group
Looking for a Computer Network Defense Information Security Specialists ISSs responsible for analysis of data collected using a variety of CND tools including intrusion detection system alerts, firewall and network traffic logs and host system logs to analyze events or perform threat or target analysis that occurs within the environment. The CND ISS must conduct unstructured investigative analysis of events/incidents and is responsible for managing the event through its lifecycle. Analysts should be capable of making decisions around prioritization of incidents based on the nature of the situation and should react with a heightened sense of urgency. Notify management, incident responders and other team members of suspected incidents and articulate the event's history, status and potential impacts for further action. Must work in a team environment that requires strong communication and partnership with other group members to diagnose and resolve security related events. ISSs may be engaged in security related projects as needed. ISS's must be strong problem solvers with the ability to methodically and objectively analyze and resolve information security challenges. ISSs must have the ability to identify opportunities for proactive work by using tools and information available. This role might require working in a shift pattern to support other Cyber Security Centers. Significant knowledge of particular CND tools, tactics, techniques and procedures which support their analysis of event information. - Ability to perform analysis of log files from a variety of sources within the Network Environment or DMZ including host logs, network traffic logs, firewall logs and IDS system logs. - Experience in monitoring external data sources to maintain currency of CND threat conditions and determine which security issues may have an impact on the Network Environment. - Experience in performing event correlation using information gathered from a variety of sources within the network environment to gain situational awareness and determine the effectiveness of an observed attack. - Demonstrated understanding of platform security fundamentals Hardware, Windows, and Linux. Must be able to write scripts using languages as Python and/or PowerShell - Strong analytical and critical thinking skills as well as English skills at an intermediate to advanced level both written and spoken with strong communication skills are a must. - Experience in Cloud Security and Penetration testing - Must be able to manage own personal performance, with a highly action orientation attitude and able to resolve complex problems. - Must have experience in partnering with another business groups, L3, engineers and a wide range of stakeholders Other preferred Requirements: - GSEC, GCIH, GCIA, GNFA, SANS certifications are preferred. - McAfee Certified Product Specialist SIEM certification or its equivalent in experience is a strong plus - Certified Ethical Hacker knowledge is a strong plus. - CISM is highly desired - Understanding of web application threats and penetration testing concepts. - Ability to conduct research, analysis and correlation across a wide variety of all source data sets.
Intel's Information Technology Group (IT) designs, deploys and supports the information technology architecture and hardware/software applications for Intel. This includes the LAN, WAN, telephony, data centers, client PCs, backup and restore, and enterprise applications. IT is also responsible for e-Commerce development, data hosting and delivery of Web content and services.