- Palo Alto Networks (Los Angeles, CA)
- …environment at scale, thrive in driving innovation, have a solid background in cybersecurity sales, and a deep understanding of security solutions. They will ... everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of...work together with large organizations to keep their digital information safe. Our passionate sales teams educate, inspire, and… more
- Coinbase (Sacramento, CA)
- …build the emerging onchain platform - and with it, the future global financial system . To achieve our mission, we're seeking a very specific candidate. We want ... of crypto and blockchain technology to update the financial system . We want someone who is eager to leave...alignment. Attendance is expected and fully supported. The Application Security organization at Coinbase is seeking to hire an… more
- Palo Alto Networks (Santa Clara, CA)
- …-level programming is required + Familiarity with macOS frameworks such as System Extensions, Network Extensions, and Endpoint Security Framework + Proficiency ... everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of...win with precision. Prisma Access (TM) combines the Internet connectivity/ security you need - and delivers it everywhere you… more
- Palo Alto Networks (Santa Clara, CA)
- …the lifecycle of traditional and Generative AI model deployment and real-time inference systems . + System Optimization: Design and optimize large-scale AI/ML ... AI solutions. + Responsible AI & Quality: Ensure AI systems comply with responsible AI principles and security...advancements in AI. **The Team** Working at a high-tech cybersecurity company within Information Technology is a… more
- Palo Alto Networks (Santa Clara, CA)
- …At Palo Alto Networks(R) everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting our digital way of life. Our vision is a ... who are as committed to shaping the future of cybersecurity as we are. **Who We Are** We believe...Alto Networks is building the world's most comprehensive AI security platform. Organizations are increasingly building complex ecosystems of… more
- Palo Alto Networks (Santa Clara, CA)
- …inspiring leader with media and public speaking experience, deeply embedded in information security community + Experience with forensic processes and procedures ... expertise and experience in investigations, data breach response, digital forensics, and information security . With a highly successful track record of… more
- Robert Half Technology (Oakland, CA)
- Description Overview We're looking for a Senior Systems Engineer to lead the design, implementation, and support of enterprise infrastructure across on-premises, ... environments. This role serves as a senior technical resource for escalations, ensures systems are secure and scalable, and provides mentorship to IT team members.… more
- KBR (El Segundo, CA)
- …+ Impactful Work: Your contributions will be pivotal in designing and optimizing defense systems that ensure national security and shape the future of space ... Title: SATCOM Systems Integration Strategist Belong. Connect. Grow. with KBR!...Integration Strategist Belong. Connect. Grow. with KBR! KBR's National Security Solutions team provides high-end engineering and advanced technology… more
- KBR (El Segundo, CA)
- …+ Impactful Work: Your contributions will be pivotal in designing and optimizing defense systems that ensure national security and shape the future of space ... Title: Associate Systems Integrator Belong. Connect. Grow. with KBR! KBR's... Integrator Belong. Connect. Grow. with KBR! KBR's National Security Solutions team provides high-end engineering and advanced technology… more
- Meta (Menlo Park, CA)
- …equivalent) in Information Systems Engineering, Computer Science, Engineering, Information Security , Cyber Security , Information Assurance, or ... **Summary:** Meta's Offensive Security Group is seeking an experienced Offensive ...research and exploitation against both internal and external facing systems 2. Design, scope, and lead complex technical assessments,… more