Skip to main content
Szukaj ofert

Cloud Security Architect

Bangalur, State of Karnataka, Indie Identyfikator oferty JR0249189 Kategoria Software Engineering Tryb pracy Hybrydowy Poziom doświadczenia Doświadczony

Job Description

Job Description Join us to lead the next generation of trusted data platform as a service in the Cloud. At Intel Trusted Platform Engineering we are on a mission to create a Trusted Data Platform as a service that is based on state-of-the-art distributed systems, cryptography, confidential computing, and public cloud platforms. This service has the potential to revolutionize the way enterprises store data in the cloud by providing an exceptional degree of data integrity, resiliency, confidentiality, and verifiability - with all the advantages of a managed service. You will hone your cloud security architecture skills and enhance them to include cutting edge confidential computing concepts for the Cloud. Confidential computing is poised to change the way enterprises think about their Cloud adoption strategy, and this is a chance to enable security in this area. Another unique aspect of this role is the exposure to multiple public cloud platforms as the service will eventually utilize all major cloud vendors to fulfill its data integrity, resiliency, and availability promise. Responsibilities � Own the security vision, roadmap, architecture, and compliance for the Intel Trust Platform (ITP) cloud service. � Architect, design and implement cloud security strategies and policies for the ITP cloud service. � Ensuring the security of cloud-based data and applications against unauthorized access, theft, and other threats. � Conducting regular security assessments and audits to identify vulnerabilities and develop plans to address them. � Collaborating with other IT professionals, including network engineers, developers, and system administrators, to integrate cloud security measures into existing systems and processes. � Staying up to date on the latest cloud security technologies, trends, and best practices and incorporate these technologies in the roadmap and propose best plans to implement them. � As part of this role, you will have the influence, scope, and responsibility to ensure that the software architecture for the ITP service is well-designed to meet current and ongoing security and compliance requirements. � Must be hands-on technical expertise with a mixture of architecture, design, and implementation. � Assess all potential attack vectors throughout the product lifecycle and mitigating through architecting mechanisms, establishing internal policies, and monitoring. � Engage with ecosystem partners to bring advanced new ways of securing our cloud offerings based on industry best and standard practices. � Proliferate robust security principles through your technical contributions and evangelization into our organization work-practices, including threat modeling, secure code reviews, fuzzing, penetration testing, rapid resolution of security defects and promote Hackathon activities. � Respond to customer/client requests or events as they occur. Actualize knowledge of state-of-the-art security principles, theories and attacks and proactively mitigate security vulnerabilities. � Influence, technically, cloud design teams, software products, industry spec committees, peers, and managers. Contribute to the development of intellectual property. Day to day activities can vary but will be a combination of the following: Design and planning for security initiatives and security issues. Fix complex technical issues and participate in technical/code review for security solutions. Collaboration, mentoring and guidance to engineers. Research and Proof-of-Concept development. Architecture evolution and forward thinking. Architecture and Design communications (presentations and meetings). Work deliverables include: Drive Security initiatives with best architecture and designs Security and compliance plans Update/review functional designs from security standpoint and incorporate security concepts in the designs with best design considerations. Threat models and threat analysis Technical presentations


Skills To do this you will need: Strong problem solving and analytical skills about complex cloud security issues. Effective communication skills. Attention to detail. Leadership and collaboration skills. And the following technical skills and software engineering processes: Able to design and define cloud security architectures and frameworks for AWS / GCP / Azure. Should have deep understanding of securing cloud resources (compute, network, storage) including containerization technology (E.g., Kubernetes) and service mesh (E.g., istio) Strong knowledge of networking and security in Cloud environments (API gateways, firewalls, routing, and security policies). Familiarity with principles related to securing distributed systems (consensus, distributed identity) Knowledge of securing database systems (relational and object stores), including securing data at rest. High degree of proficiency in coding and scripting with modern object-oriented languages and scripting tools. Familiarity with securing Infrastructure-as-code tools, and technologies. Deep understanding of monitoring and logging in Cloud environments including threat monitoring and active remediation. Ability to use adequate set of security controls for shaping security posture in IaaS and PaaS based environments. Ability to demonstrate proof-of-concepts with complex cloud security architectures and cloud native security controls. Understanding of Cloud Governance, Regulatory and Compliances standards like CIS Benchmarks, NIST Framework, PCI-DSS, GDPR, etc. Good to have understanding and working knowledge of CSPM, CWPP, CNAPP tools like Prisma Cloud, Zscaler, Sysdig and other tools. Able to drive cloud security risk assessment and identify the GAPs and define remediation approach by using the right set of security controls to conclude the assessment. A good understanding of DevSecOps lifecycle like CI/CD pipeline, IaC etc. Secure Development Lifecycle Agile Development Methodology Experience Preferred Qualifications: 10+ years of industry experience in one or more of the following: CyberSecurity for data centers, clouds and cloud-based services Data privacy In-depth understanding of security concepts, such as threat modeling, security lifecycle, secure HW/SW architecture, and design, knowledge of cryptographic application (algorithms, usage etc.), security implication of various cloud services.

Inside this Business Group

Enable amazing computing experiences with Intel Software continues to shape the way people think about computing – across CPU, GPU, and FPGA architectures. Get your hands on new technology and collaborate with some of the smartest people in the business. Our developers and software engineers work in all software layers, across multiple operating systems and platforms to enable cutting-edge solutions. Ready to solve some of the most complex software challenges? Explore an impactful and innovative career in Software.

Posting Statement

All qualified applicants will receive consideration for employment without regard to race, color, religion, religious creed, sex, national origin, ancestry, age, physical or mental disability, medical condition, genetic information, military and veteran status, marital status, pregnancy, gender, gender expression, gender identity, sexual orientation, or any other characteristic protected by local law, regulation, or ordinance.


We offer a total compensation package that ranks among the best in the industry. It consists of competitive pay, stock, bonuses, as well as, benefit programs which include health, retirement, and vacation. Find more information about all of our Amazing Benefits here.

It has come to our notice that some people have received fake job interview letters ostensibly issued by Intel, inviting them to attend interviews in Intel’s offices for various positions and further requiring them to deposit money to be eligible for the interviews. We wish to bring to your notice that these letters are not issued by Intel or any of its authorized representatives. Hiring at Intel is based purely on merit and Intel does not ask or require candidates to deposit any money. We would urge people interested in working for Intel, to apply directly at and not fall prey to unscrupulous elements.

Working Model

This role will be eligible for our hybrid work model which allows employees to split their time between working on-site at their assigned Intel site and off-site. In certain circumstances the work model may change to accommodate business needs.
Maggie, Offensive Security Researcher

Maggie Offensive Security Researcher

Zawsze chciałam robić coś, co będzie zmieniać świat — w firmie Intel czuję się doceniona i nabrałam większej pewności siebie. Czuję, że jestem w stanie robić wspaniałe rzeczy.
Zobacz wszystkie oferty pracy

Nie masz jeszcze ostatnio wyświetlanych ofert pracy.

Zobacz wszystkie oferty pracy

Nie masz jeszcze zapisanych ofert pracy.

Zobacz wszystkie oferty pracy