Come work at a place where innovation and teamwork come together to support the most exciting missions in the world!

Are you passionate about working with smart people on challenging problems in an environment that values hard work, integrity and teamwork? F5 Networks is hiring for its Centre of Excellence office in Hyderabad, India. Come join us and help build and grow a world class site.


  • Monitoring & investigating security events from multiple sources, analyze the results and escalate, when necessary, to the appropriate group for remediation. The events will originate from, but are not limited to DLP, IDS, IPS, EDR, antivirus, firewalls and system security logs using Sumo Logic, Anomali ThreatStream, Cylance, Carbon Black, etc.
  • Identify and respond to cyber security incidents, including analysis of event data, to identify and validate security breaches. Involves communicating with stakeholders and making sound recommendations on mitigation and prevention techniques.
  • Identify security exposures that currently exist, or are emerging, and that create potential threats to F5's infrastructure, systems, or data. Propose risk mitigating strategies to leadership. Advise on acceptable mitigating controls and ensure they are documented.
  • Good knowledge of malware analysis, phishing events, spoofing events, DoS-DDoS events, SQL injections events, ransomware incidents.
  • Monitor security blogs, articles, and reports and remain current on the ability to predict, detect, and respond to the latest security risks, threats, and technology trends.
  • Conduct detailed analysis of suspect systems using various forensic tools and techniques, which may include malware analysis.
  • This position also requires working closely with Tier 3 teams for escalating and resolving any relevant security issues.
  • Develop custom content for the SIEM platform. This would include creating, publishing, and communicating the availability of dashboards that will be monitored by the Security Operations Center.

Required Skills & Knowledge:
  • Minimum Bachelor's degree in Information Systems, MIS or related technical degree and 2 years of progressive experience in Information Technology OR 4 years of experience relevant to the field
  • An understanding of at least two of the following Operating Systems: Windows, Linux and/or Mac at a filesystem level
  • Provide knowledge around Internet protocols, services and technologies (e.g. HTTP/HTTPS, DNS, SMTP, SSH, LDAP, TCP/IP, UDP, ICMP, JSON, REST, etc.)
  • Common security controls (e.g. firewalls, proxies, IDS/IPS, WAF, etc.)
  • Malware and exploit kit functionality experience
  • Lateral movement, living-off-the-land, and persistence establishment mechanisms
  • Detection of anomalous system activity
  • Incident response and incident handling processes
  • Good technical interpersonal skills, both written and verbal; attention to detail and phenomenal organizational and time management skills
  • Excellent analytical skills that would allow for the ability to diagnose and tackle technical issues
  • Courage and willingness to challenge conventional wisdom
  • Ability to research and characterize security threats including crafting appropriate countermeasures
  • Demonstrated track record of identifying and pursuing strategic and complex areas of security research in collaboration with internal and external partners at all levels, to include defining appropriate policies, practices, and countermeasures
  • Host-based security tools
  • Network-based security tools
  • Malware analysis sandboxes and tools
  • Experience with one or more of the following platforms:
    • Carbon Black, FireEye, Splunk, Arcsight, Sumo Logic, Cylance, Cisco, Iron Port, etc.

Preferred certifications:
  • SANS GCIA, GCIH, CCNA, CISSP, CEH, Security+, ArcSight, or other industry-relevant cyber-security certifications are a plus.

The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.

The Job Description is intended to be a general representation of the responsibilities and requirements of the job. However, the description may not be all-inclusive, and responsibilities and requirements are subject to change.

Equal Employment Opportunity

It is the policy of F5 to provide equal employment opportunities to all employees and employment applicants without regard to unlawful considerations of race, religion, color, national origin, sex, sexual orientation, gender identity or expression, age, sensory, physical, or mental disability, marital status, veteran or military status, genetic information, or any other classification protected by applicable local, state, or federal laws. This policy applies to all aspects of employment, including, but not limited to, hiring, job assignment, compensation, promotion, benefits, training, discipline, and termination. Reasonable accommodation is available for qualified individuals with disabilities, upon request.

Meet Some of F5 Networks's Employees

Rubyanne O.

Systems Engineering Manager

Rubyanne manages a team of systems engineers—the technical half of a Sales Account Team—empowering them with the tools they need to be successful as they provide pre-sales support throughout northern California.

Marcus C.

Inside Channel Account Manager

Marcus works with F5’s reseller partners to identify their customers’ pain points and identify how F5’s products can provide solutions to increase the speed, availability, and security of their applications.

Back to top