Intuit believes in the power of the individual. The power to do more. To make more. To be more.
We believe in the people who do things the hat jugglers, the to-do list junkies, the masters of getting it done faster, better and more efficiently than ever before.
Whether that's balancing the household budget, running a business or paying taxes.
We believe in these people because we are these people. We thrive on action and results. And by making things simpler, we all get more out of doing what we love.
We're innovators, and have been at it for more than three decades. And we don't stand still.
As the world evolves, so do we inventing new solutions to solve important problems, perfecting those solutions and delighting our customers.
In short : We’re on a mission to power prosperity around the world.
The Intuit Information Security (IIS) team is looking for a Staff Security Engineer to join our Forensics Infrastructure & Investigations team. Come and join us.
Build, deploy, and manage advanced malware solution
Develop tools, techniques, signatures, and processes to detect advanced malwares
Perform threat analysis in cloud services environment (Amazon Web Services, Google Cloud Platform)
Perform malware analysis using static and dynamic analysis, malware code deobfuscation, sandboxing, and reverse engineering malware techniques
Extract Indicators of compromise (IOC) from malware analysis, and build detection rules to proactively detect threats
Conduct multi-source investigations using various data sources to further evaluate findings, map relationships, determine lateral movement or information leakage, analyze geo-
location information, verify attribution, and independently corroborate the case’s background information
Build, deploy, and manage threat detection / prevention technologies (perimeter security, EDR tools, etc.)
Implement processes, procedures and capabilities for advanced malware analysis solutions
Providing oversight, technical requirements and standards to internal application teams for threat and forensic analysis.
Document, maintain and update SOP's for acquisition, analysis and reporting techniques.
Supporting security incident analysis and response, including analysis of network or endpoint content and metadata for detailed time lining and event reconstruction.
Conduct product evaluation, and deliver report outlining comparisons and value addition