Past 24 hours
San Jose, CA (1,015)
Palo Alto, CA (623)
Santa Clara, CA (590)
Mountain View, CA (478)
Sunnyvale, CA (431)
Years of Experience
0-4 years (1,374)
5-7 years (3,726)
8-10 years (2,114)
11-14 years (1,722)
15+ years (399)
Vice President (0)
Individual Contributor (0)
Easy Apply only
Lead, build, retain, hire and develop a team of Managers of the Security Program Management function responsible for overseeing the delivery of Operational Security Programs enabling the Security team...
Responsible for recreating the customer found defects in the Lab environment. Contribute to engineering efforts to solve complex engineering problems in testing and tools. Design, develop and extend t...
Develop software to detect and block different type of security threats including viruses, malware, etc. Participate in all phases of the product development cycle, from definition, design, through i...
Build reusable, testable, scalable, and efficient Python/Go-based security automation that improve daily operations of Cloud. Extend existing security services and platforms to enhance partner capabil...
Act as the Security Advisor to the district and collaborate with the team to drive outcomes with the account team and customer. Lead security engagements with customers to evaluate their various compl...
Working directly with customers is one of our core values. In this role, you'll be able to meet customers as they share their experiences, get a first-person view of the state of the art Security Oper...
You will own early identification & control with minimal or no disruption to project/program deliverables. Becoming the critical escalation manager as it relates ongoing projects...
Present complex technical concepts in a manner that can be easily understood by non-technical or semi-technical audiences Act as a consultant to the customers, striving to gain a trusted advisor statu...
Write code to onboard or manipulate a particularly interesting security-relevant data source, or to build an entire add-on or improvement to our core or premium products. You are also expected to ment...
Research industry and academic leading-edge algorithms for distributed consensus, replication, consistency, availability and scalability in a context where security is key...
Evaluate risks that the applicable vulnerabilities pose to the organization and understand the technical implementation details in order to assess and recommend security control improvements or identi...
Work with overall Access Management Lead, Information Security, and cross-functional partners to build, maintain, and execute on a roadmap considering short, medium, and long term access control and o...
Strong understanding of performance tuning at the micro and macro level including JVM tuning (Flame graphs and other tools), messaging system bottlenecks, and distributed locking issues...
Participate in root cause analysis of any security incidents and propose actionable response to prevent their reoccurrence. Propose best practices/standards/protocols, and monitor industry channels fo...