Employer Active
You are passionate about technology and customers. You are a true problem solver, the Technical Support Engineer will take personal ownership in seeing a problem through to resolution. You will be a key resource to all teams for technical requests and questions. You will proactively help to drive service delivery and improve Enterprise IT products and services.
You will understand the product and processes at all levels, as well as customer environments across heterogeneous operating environments. You will be comfortable speaking with security teams as well as customer operation teams. Candidates must have technical depth and a customer-first mentality, the desire to take the initiative to own and resolve customer issues, and interest in working in a fast paced, team focused environment, supporting a zero-time cybersecurity solution.
What You'll Do:
Requirements :
Who You Are:
We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, genetic information, protected veteran status, sexual orientation or any other characteristic protected by federal, state or local laws.
About Deep Instinct:
Deep Instinct, is the first cyber security company to apply Deep Learning as a platform. We are the only cyber security company harnessing the the power of deep learning to prevent 99% of known and unknown attacks from malware and zero-day threats.
Deep Instinct Prevention Platform. The Deep Instinct Prevention Platform is changing the way organizations approach cybersecurity by stopping unknown threats before they can land in your environment with the highest accuracy and lowest false positive rate in the industry. For your organization this means fewer alerts to chase, true prevention of ransomware and zero-day threats, and greater assurance that the attackers will not succeed.
Deep Instinct Prevention for Applications. meets the attacker earlier to prevent threats hidden in your files known, unknown ransomware, or zero day before they land on the endpoint, server, or enter storage. File uploads through your web applications, user downloads from the internet, and third-party suppliers transferring files into your environment leave your organization blind to malicious content traversing your network.
Remote Work :
Yes
Employment Type :
Full-time
Full-time