The Client SOC Architecture team is looking for a Security Architect/Researcher. Our team is responsible for the development of the latest generation Intel SOCs. We define the hardware and firmware components to raise the bar for Intel products with better performance, lower power and cost and improved security.
The Security Architect works in a dynamic and challenging environment which combines security assurance and the design of new security features. The Security Architect is an essential member of the SOC architecture team who is exposed to every aspect of the SOC architecture because of the fact that every feature must obtain security approval. We will train the candidate to become an expert in hardware security architecture.
The job entails a combination of the following tasks:
Security analysis and threat assessment of the entire SOC architecture.
This includes reviewing all new features for potential security impact and resolving potential security issues with the feature owners.
Define new security features that combine hardware, firmware and software components.
This may include the development of intellectual property.
Define and document the SOC security architecture.
Own the architecture step of the Security Design Lifecycle process including presenting the SOC security architecture to the Intel Security Forum for approval.
Provide consultation to multiple design and validation teams regarding security issues and questions.
Participate in Hackathons to look for potential vulnerabilities in IPs or features.
Define security validation requirements and approve validation test plans.
Respond to customer requests for urgent features.
Take an active role in resolving security vulnerabilities that are discovered in existing products
An academical degree in Computer Science, or Electrical/Computer Engineering
At least 3+ years of experience in SOC architecture and/or security design or validation.
Experience in one or more of the following areas is a plus:
Firmware Reverse engineering experience.
Familiarity with Crypto algorithms and usages.
Secure development lifecycle.