Responsible for analyzing, designing, debugging and/or modifying software; or evaluating, developing, modifying and coding software programs to support programming needs. Maintain and enhance existing code with focus on implementation. Collaborate with and assist team of engineers in writing functional, design and user interface specifications. Follow software lifecycle process when developing software. Help identify solutions to problems encountered in software cycle. Design, develop and maintain Browser Protection and Exploit protection and Network Intrusion Prevention components for Norton products and Symantec Enterprise Security products. Participate in all phases of product development, including research, implementation, testing/unit testing and documentation. Regularly analyze and investigate malware and exploits and recommend solutions to prevent exploitation of vulnerabilities in OS and other applications. Supervising and mentoring other team members. Ensure that teams’ deliverables are produced on schedule to the appropriate level of quality. Provide feedback and review to the development manager on development process reporting on work progress on a regular basis. Develop an overall software architecture by collaborating with team members or other groups in writing functional, design, interface specifications and prototypes. Employer will accept Master’s degree in Computer Science, Engineering or related technical field and 2 years of work experience in job offered or in a computer-related occupation.
Alternatively Employer will accept Bachelor’s degree in Computer Science, Engineering or related technical field, and five years of work experience in job offered or in a computer-related occupation.
1. Application Security, Network Security
2. Firewall and Intrusion Prevention technologies
3. Application layer protocols (HTTP, SMB, FTP, etc.)
4. C or C++ Kernel
5. Debugging skills, both user mode applications and kernel mode drivers, using WinDbg, Visual Studio and other debuggers
6. data structures and algorithms
7. Windows operating systems with multi-core processors
8. Source code control systems such as CVS, Perforce, SVN etc.
9. Build systems and processes, specifically variants of make and/or Microsoft build systems
10. reverse engineering malware or exploits targeting browser vulnerabilities.
12. browser internals, underlying technologies and various plugin mechanisms applicable to Internet Explorer, Firefox, Chrome and other browsers.