Bitdefender.com is a website dedicated to providing world-class security solutions for both home and business users. The website offers a wide array of solutions, from anti-virus and anti-malware protection to data encryption and password management. It also provides users with valuable cyber security information and guidance so that they can make better decisions about how to protect their systems. Bitdefender.com also provides a variety of services, such as automatic updates and customer support, to ensure that users are always up to date with the latest security measures and solutions. With its comprehensive security solutions and world-class support, Bitdefender.com is the perfect choice for anyone looking to secure their systems and data.
In 2007, SOFTWIN spun off Bitdefender. [4] 1990: Creation of Softwin, one of the first IT start-ups in post-communist Romania.en.wikipedia.orgBitdefender software was originally developed by SOFTWIN and sold as AVX (Antivirus Expert) from 1996 until 2001, when its name was changed.
Is Bitdefender better than Windows Defender? Both the programs are lightweight and reliable. Compared to Bitdefender, Windows Defender lacks certain privacy and security features.dealarious.comBitdefender Mobile Security for Android protects your Android devices against cyber threats and includes advanced features like VPN, Anti-Theft, App Lock.
The free Bitdefender Home Scanner lists every device connected to your network, flagging those that could be vulnerable to attack. Advice on how to resolve those vulnerabilities is limited, though.pcmag.comBitdefender Premium VPN offers split-tunneling and 10 simultaneous connections at an extremely reasonable price, but without many bells and whistles to make it stand out.
-
EncryptedSite is Encrypted
-
CountryHosted in United States
-
Latitude\Longitude37.751 / -97.822 Google Map
-
Traffic rank#2,630 Site Rank
-
Site age23 yrs old
-
Site Owner informationWhois info
-
FoundedNovember 6, 2001
-
FounderFlorin Talpeș
-
HeadquartersBucharest, Romania
-
Key peopleFlorin Talpeș (,CEO,)
-
Number of employees1600+ (2019)
-
Area servedWorldwide
-
ProductsCybersecurity software
-
ServicesComputer security
#2,630
23 yrs
United States
(remote option available...
Our mission at Bitdefender is to reduce risk to customers’ business to allow them to achieve their objectives. We are focused on delivering real security value for an affordable price – no snake oil. To help in this mission, we are looking for an Senior Security Analyst III. You will work in a tight knit, experienced team backed up by an international organization that’s been in business for 21 years.
About Us
The Managed Detection & Response service is a new line of business (think division, business unit, etc). We are an experienced team having built successful Managed Security offerings in the past and staffed by a multitude of cybersecurity organizations and veteran cyber-warfare operators from the military and intelligence services. We all got into this business to provide security services that make customers safer. We must make some money to do that, but our primary goal is to provide services that secure, not just ones that sell.
Our team has been around the block together and operate in a 24x7 environment where we manage emergency situations for customers. For this to work, we must trust each other. As a leadership team, we focus on building that trust through accountability, processes and personal relationships. We have plenty of experienced team members with and without families and understand that not all teams can be built outside of work, but we focus on teamwork to build authentic and meaningful engagement.
About the Role
• This is a full-time position in a 6a-10p operation with a (Panama schedule). Scheduled rotations for evening and weekend shifts will be required
• Under limited supervision perform real-time monitoring and analysis of security events from multiple sources including both host and network telemetry
• Triage security events to determine priority and severity
• Proactively review customers environments searching for anomalous behavior using the cyber kill chain, cyber intelligence, and investigative techniques
About you
Be able to articulate when discussing the following:
• Cybersecurity principles
• Cyber threats and vulnerabilities
• Current incident response methodologies (how you have managed)
• Current cyber investigative techniques
• Current cyber threat trends
• Computer networking concepts and protocols, and network security methodologies
• Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, NICs, HDDs)
• Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security
• Basic system administration, network, and operating system hardening techniques
• Identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files)
• Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
• Defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness)
• Virtualization and cloud computing
• Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files
• Hacking methodologies
• Networking protocols (e.g., TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications
• Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA]) and how they are used
• How to perform packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
• Security Information and Event Management (SIEM) tools - Searching, aggregating, and correlating data
• Web Application Firewall (WAF)
• Regular Expressions (Regex)
What we offer
This role is for a fast-growing startup inside a larger organization. This enables us to offer a compelling suite of benefits while still allowing us to move fast and experiment like a smaller organization. This includes:
• Wide variety of health and wellness plans
• Competitive salary and total compensation plans with quarterly bonuses
• 401k retirement planning
• Paid career development and training
• Subsidized cell phones and gym membership
Powered by JazzHR
SFkgGvz2WG Show more details...
(remote option available...
Our mission at Bitdefender is to reduce risk to customers’ business to allow them to achieve their objectives. We are focused on delivering real security value for an affordable price – no snake oil. To help in this mission, we are looking for an SeniorSecurity Analyst III. You will work in a tight knit, experienced team backed up by an international organization that’s been in business for 21years.
About Us
The Managed Detection & Response service is a new line of business (think division, business unit, etc). We are an experienced team having built successful Managed Security offerings in the past and staffed by a multitude of cybersecurity organizations and veteran cyber-warfare operators from the military and intelligence services.We all got into this business to provide security services that make customers safer. We must make some money to do that, but our primary goal is to provide services that secure, not just ones that sell.
Our team has been around the block together and operate in a 24x7 environment where we manage emergency situations for customers. For this to work, we must trust each other. As a leadership team, we focus on building that trust through accountability, processes and personal relationships. We have plenty of experienced team members with and without families and understand that not all teams can be built outside of work, but we focus on teamwork to build authentic and meaningful engagement.
About the Role
• This is a full-time position in a 6a-10poperation with a (Panama schedule). Scheduled rotations for eveningand weekend shifts will be required
• Under limited supervision perform real-time monitoring and analysis of security events from multiple sources including both host and network telemetry
• Triage security events to determine priority and severity
• Proactively review customers environments searching for anomalous behavior using the cyber kill chain, cyber intelligence, and investigative techniques
About you
Be able to articulate when discussing the following:
• Cybersecurity principles
• Cyber threats and vulnerabilities
• Current incident response methodologies (how you have managed)
• Current cyber investigative techniques
• Current cyber threat trends
• Computer networking concepts and protocols, and network security methodologies
• Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, NICs, HDDs)
• Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security
• Basic system administration, network, and operating system hardening techniques
• Identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files)
• Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
• Defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness)
• Virtualization and cloud computing
• Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files
• Hacking methodologies
• Networking protocols (e.g., TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications
• Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA]) and how they are used
• How to perform packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
• Security Information and Event Management (SIEM) tools - Searching, aggregating, and correlating data
• Web Application Firewall (WAF)
• Regular Expressions (Regex)
What we offer
This role is for a fast-growing startup inside a larger organization. This enables us to offer a compelling suite of benefits while still allowing us to move fast and experiment like a smaller organization. This includes:
• Wide variety of health and wellness plans
• Competitive salary and total compensation plans with quarterly bonuses
• 401k retirement planning
• Paid career development and training
• Subsidized cell phones and gym membership Show more details...
About Us...
Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Founded in 2001, Bitdefender has customers in 170 countries with offices around the world.
Our team has been around the block together and operate in a 24x7 environment where we manage emergency situations for customers. For this to work, we must trust each other. As a leadership team, we focus on building that trust through accountability, processes, and personal relationships. We have plenty of experienced team members with and without families and understand that not all teams can be built outside of work, but we focus on teamwork to build authentic and meaningful engagement.
About the Role:
• This is a full-time position in a 24/7 operation with a 12-hour rotating shift Panama schedule (6a-6p) & (10a-10p) which includes holidays and weekends
• Serve as an escalation point for security events from multiple sources
• Using the Cyber Kill Chain, indicators of activity and indicators of compromise with current intelligence information to proactively review customers environments searching for anomalous behavior across network, host and logs data
• Lead an Incident Response Team to investigate and remediate active threats while accurately documenting results using standard incident response techniques
• Develop analytic signatures to identify suspicious and malicious behaviors
• Conduct Team Lead and managerial responsibilities
About you:
Be able to demonstrate working knowledge and understanding of the following:
• Cybersecurity principles
• Cyber threats and vulnerabilities
• Current incident response methodologies
• Current cyber investigative techniques
• Current cyber threat trends
• Computer networking concepts and protocols, and network security methodologies
• Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, NICs, HDDs)
• Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security
• Basic system administration, network, and operating system hardening techniques
• Identifying, modifying, and manipulating applicable system components within Windows, Unix, or Linux (e.g., passwords, user accounts, files)
• Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
• Defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness)
• Virtualization and cloud computing
• Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files
• Hacking methodologies
• Networking protocols (e.g., TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications
• Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA]) and how they are used
• How to perform packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
• Security Information and Event Management (SIEM) tools - Searching, aggregating, and correlating data
• Web Application Firewall (WAF)
• Regular Expressions (Regex Show more details...