Startup Careers

Be a part of our family by contributing to our portfolio companies’ innovation and success. Browse open positions below with Intel Capital portfolio companies.

Software Tester at Bromium
Cambridge, GB

 Position Summary: 

You will be performing software test activities for a complex enterprise class
security product based on micro-virtualization. Testing in this role is
expected to be predominantly manual testing and will involve planning/executing
tests to assure the quality of changes made to the product. The role may also involve writing scripts to
drive tools and frameworks written by other testers or developers. 


Job Responsibilities: 

· Plan and execute tests to verify both fixes and new features 

· Create and maintain clear test cases, test suites and test plans as necessary, to
reflect changes in the product 

· Investigate defects and submit defect reports  

· Co-operate effectively with development and product teams to produce high quality software 



Job Requirements:  

· Proven software testing experience, including writing manual test cases. 

· A knowledge of and interest in general software testing methodologies 

· Experience in administration and configuration of Windows machines 

· Strong problem solving, analysis and communication skills 


The following skills and attributes are
a plus: 


· Knowledge of a scripting language  

· Experience of browser testing (using Selenium)  

· Understanding and experience of virtualization  

· Bachelor’s degree or equivalent in Computer Science or a related technical subject  


Company Overview: 

Bromium was founded in 2010 with a mission to restore trust in computing. The company’s founders have a long and deep history of innovation in virtualization and security. Inspired by the isolation principles of traditional virtualization, the Bromium team has created a game-changing technology called micro-virtualization to protect end users against advanced malware. Every task the user performs, such as opening a document or clicking on a link, is isolated in its own micro-VM, with access to just the resources required for that task, and existing just for the life of the task. Protection is thus provided through isolation, without relying on detection, hence reliably defending the user from polymorphic and even zero-day malware.