- NVIDIA (Santa Clara, CA)
- …& operations as it relates to: + Cloud-based cybersecurity principles + Anti-Bot/ Malware /Virus + DLP + IDS/IPS + SSL Inspection/Decryption + URL Inspection + ... Zero Day + Understanding of host network hardening. Understanding of network virtualization such as: VRFs, VxLAN + Strong background in routing and switching - BGP(iBGP, eBGP, RPKI), route reflectors, RTBH, 802.1x, MACSec . Understanding of network backbone… more
- Palo Alto Networks (Santa Clara, CA)
- …to our products to prevent successful cyberattacks. The areas include malware analysis, IoT security, Web security, network security, privacy protection. Engineering ... is at the core of our products and connected directly to the mission of preventing cyberattacks. We are constantly innovating - challenging the way we, and the industry, think about cybersecurity. Our engineers don't shy away from building products to solve… more
- Palo Alto Networks (Santa Clara, CA)
- …to our products to prevent successful cyberattacks. The areas include malware analysis, IoT security, Web security, network security, privacy protection. Engineering ... is at the core of our products and connected directly to the mission of preventing cyberattacks. We are constantly innovating - challenging the way we, and the industry, think about cybersecurity. Our engineers don't shy away from building products to solve… more
- Zscaler (San Jose, CA)
- …on various cybersecurity use cases including threat detection, policy recommendation, malware detection, content classification, and anomaly detection. In this role, ... you'll have the opportunity to work on innovative ML/AI projects that address important cybersecurity challenges. This is a hybrid work environment, going into our San Jose, CA office 3 days a week. Reporting to the Sr. Director, Machine Learning, you'll be… more
- City and County of San Francisco (San Francisco, CA)
- …and/or production software, adjunct support and/or utility software, ie Virus malware protection, office application suites and/or application software. 9. Evaluates ... and recommends new technologies, optimize operational efficiency and troubleshoot problems arising in the infrastructure environments. 10. Participates in deployment of overall enterprise disaster recovery (DR) strategy. *This position may include additional… more
- Amazon (Hawthorne, CA)
- …hunting techniques to identify adversary behavior, detect anomalies, analyze potential malware to support containment and eradication - * Security certifications ... such as CISSP, CISM, CRISC, GCIH, CCIR, GCDA, etc. - * Prior experience in large enterprise environments or supporting multiple business lines - * Experience securing or responding to incidents in large-scale distributed systems, including cloud-native… more
- Palo Alto Networks (Santa Clara, CA)
- …- Security vulnerability detection and monitoring - Client device signature - Malware attacks - Network device discovery tools + Knowledge of cloud platforms ... (AWS, GCP) and typical "big data" processing pipeline + Machine Learning Algorithms and common ML Data Pipeline + Ability to manipulate large data sets with high dimensionality and complexity (SQL, Redshift, Mongo, Redis) **The Team** We define the industry,… more
- WuXi AppTec (San Diego, CA)
- …Assists with end user device security functions that may include anti-virus and malware protection. + Assists in infrastructure projects that may include, but are ... not limited to: VoIP deployments, network upgrades, server upgrades, email system upgrades and application deployments. + Trains users on IT Systems and Policies and create KB articles as needed. + Responds to, escalates/reassigns, and closes helpdesk tickets.… more
- Meta (Menlo Park, CA)
- …in leading operational and project work for security domains (eg, malware reversing, authentication systems) 14. Experience with working with leadership and ... engineers 15. Track record of successfully delivering complex projects and leading vulnerability investigations 16. High-level understanding of defense-in-depth strategies and self-motivated to identify opportunities 17. Experience managing competing… more
- pony.ai (Fremont, CA)
- …+ Solid understanding of the threat landscape, attacker tactics (eg, phishing, malware , APTs, DoS attacks), and defensive strategies. + Proficiency in at least ... one scripting language (eg, Python preferred). + Skilled in security technologies such as SIEM, SOAR, EDR, ID/IPS, access control, vulnerability management, cloud security, and External Attack Surface Management (EASM). + Experience with cloud security… more