Staff Software Engineer (C coding / Data Loss Protection) Engineering - California, MO at Geebo

Staff Software Engineer (C coding / Data Loss Protection)

Job DescriptionThe Staff Software Engineer will report to the Director of Engineering, Cyber Security and Data Protection, who will be helping our Cyber Security and Data Protection Engineering team to build quality in products that secure devices, applications and data.
This team develops innovative solutions that accelerate digital transformation so that customers can be more agile, efficient, resilient, and secure.
The development team works on web filtering, policy enforcement, next-gen firewall, sandboxing, DLP, Saas API, CASB, Sandbox and Endpoint Protection solutions.
Being responsive to our customers and delivering industry-leading mission-critical solutions require precise engineering and a philosophy of continuous improvement, both areas in which Zscaler engineers excel.
Responsibilities/What You'll Do Design and develop software for scalable distributed systems to provide security and data protection.
Participate in all phases of the product development cycle, from requirements, design, through implementation and test.
Create software to detect and block different types of security threats including viruses, trojans and zero day malware.
Develop software for machine learning based content categorization systems.
Develop data security and data leak prevention software solutions.
Work on the development of high-performance, fault tolerant and scalable systems.
Use algorithms and data structures to develop optimal solutions.
Develop sub systems for Secure Cloud gateway and Cloud Firewall.
Responsible for validating complex features which includes implementing, automating Identify and propose areas of improvement throughout the software development process.
Work effectively in a fast-paced and constantly changing environment.
Evaluate and implement cloud security measures to ensure the highest level of protection for our systems.
Document and communicate results, findings, and recommendations to stakeholders.
Stay up-to-date with industry trends and emerging technologies in cloud security Qualifications/Your Background 7
years experience and proficiency in Software Development Masters Degree preferred Proficiency in programming languages - C/C++, Python Strong in Algorithms and Data Structures Solid understanding of fundamental networking concepts, including TCP/IP, HTTP(S) Strong software design, profiling and verification skills.
Good understanding of distributed systems Experience debugging HTTP/HTTPS requests using Fiddler / Wireshark Experience with PKI, network security technologies and protocols Experience with RESTful APIs, threading, and performance testing Sound knowledge of Unix and FreeBSD systems internals Debugging and troubleshooting skills.
Experience developing large, maintainable software product architectures.
Excellent verbal, written and interpersonal skills Self-starter takes initiative & ownership, identifies and completes tasks; goal driven Ability to work with remote teams, handle multiple tasks, prioritize and meet deadlines Excellent communication, collaboration, analytical and problem-solving skills Experience being part of agile team for collaborative execution Good to have experience Experience in Data Leak Prevention, Advanced Threat Protection, Malware Detection Hands on experience with CASB cloud applications Experience in security or networking industry Experience in AWS, Azure, GCP #LI-JM1#J-18808-Ljbffr Recommended Skills Api Agile Methodology Algorithms Amazon Web Services Analytical Business Process Improvement Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.