Cisco
Working at Cisco
Company Summary
Overall Rating

14% above

Highly rated for
Work-life balance, Company culture, Salary
Work Policy




Top Employees Benefits
About Cisco

Cisco (NASDAQ: CSCO) enables people to make powerful connections--whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time. Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services. Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers.
AmbitionBox Best Places to Work in India Awards
Cisco Ratings
Overall Rating
Category Ratings
Work-life balance
Company culture
Salary
Skill development
Work satisfaction
Job security
Promotions
Work Policy at Cisco
Cisco Reviews
Top mentions in Cisco Reviews
Compare Cisco with Similar Companies
Change Company | Change Company | Change Company | ||
---|---|---|---|---|
Overall Rating | 4.2/5 based on 1.9k reviews | 4.0/5 based on 1.5k reviews | 3.8/5 based on 2.2k reviews | 4.2/5 based on 1.9k reviews |
Highly Rated for | Work-life balance Company culture Skill development | Work-life balance Job security Company culture | No highly rated category | Work-life balance Company culture Skill development |
Critically Rated for | No critically rated category | Promotions | Promotions Job security | No critically rated category |
Primary Work Policy | Hybrid 70% employees reported | Hybrid 94% employees reported | Work from office 66% employees reported | Hybrid 61% employees reported |
Rating by Women Employees | 4.2 Good rated by 369 women | 4.0 Good rated by 398 women | 3.4 Average rated by 222 women | 4.3 Good rated by 204 women |
Rating by Men Employees | 4.1 Good rated by 1.3k men | 4.1 Good rated by 1k men | 3.8 Good rated by 1.9k men | 4.2 Good rated by 1.2k men |
Job security | 3.5 Good | 4.1 Good | 3.2 Average | 4.0 Good |
Cisco Salaries
Software Engineer
Senior Software Engineer
Technical Consulting Engineer
Network Engineer
Software Developer
Network Consulting Engineer
Technical Lead
Software Engineer III
Consultant Engineer
Softwaretest Engineer
Cisco Interview Questions
Interview questions by designation
Top Cisco interview questions and answers
Cisco Jobs
Cisco News
Gamaredon Campaign Detection: russia-backed APT Group Targets Ukraine Using LNK Files to Spread Remcos Backdoor
- The Gamaredon APT, a Russia-linked group, is actively targeting Ukraine through the deployment of the Remcos backdoor via malicious LNK files disguised as war-related lures.
- Security experts recommend utilizing the SOC Prime Platform for AI-powered detection engineering and advanced threat hunting to identify Gamaredon Group attacks early on.
- Cisco Talos has identified an ongoing Gamaredon campaign using spear-phishing tactics to distribute weaponized LNK files posing as Office documents to deliver the Remcos backdoor.
- The Remcos RAT, utilized in the campaign, is a common tool for cybercriminals and has been previously employed by other Russia-backed hacking groups targeting Ukraine.
- Gamaredon's phishing campaigns exploit the theme of the Ukraine invasion, distributing malicious LNK files within ZIP archives under invasion-related filenames.
- The campaign employs obfuscated PowerShell scripts within the LNK files to download and execute the Remcos backdoor stealthily, using methods to avoid detection.
- The use of advanced techniques such as DLL sideloading and geo-fenced servers indicates Gamaredon's persistence in targeting Ukraine amidst geopolitical tensions.
- Organizations are advised to enhance their defenses against APT attacks, with tools like SOC Prime Platform offering advanced capabilities for collective cyber defense.
- Security professionals can leverage Uncoder AI for threat-informed detection engineering and language code analysis to strengthen their detection strategies.
- Gamaredon's continuous cyber-espionage campaigns against Ukraine underscore the need for proactive threat detection measures and staying updated on evolving adversary tactics.

U.S. CISA adds Cisco Smart Licensing Utility flaw to its Known Exploited Vulnerabilities catalog
- The U.S. CISA adds a Cisco Smart Licensing Utility flaw to its Known Exploited Vulnerabilities catalog.
- The flaw, tracked as CVE-2024-20439, allows attackers to access sensitive log files.
- No active exploitation was initially observed, but recent attack activity has been reported.
- CISA orders federal agencies to fix this vulnerability by April 21, 2025.

Cisco Talos report finds identity-based attacks drove majority of cyber incidents in 2024
- A new report by Cisco Talos found that identity-based attacks were the main driver of cyber incidents in 2024.
- Identity attacks were involved in 60% of incidents, with attackers using valid credentials and native tools, rather than new malware.
- Old vulnerabilities were also exploited in cases where identity wasn't involved.
- The report identified weaknesses in multifactor authentication (MFA) as a top security issue for identity-based attacks.

India’s IT sector is burning out: 72% exceed legal workweek limits, survey says
- A survey by Blind reveals that 72% of IT professionals in India exceed legal workweek limits.
- 83% of IT professionals in India report experiencing burnout, with the rate exceeding 90% at certain companies.
- Top companies such as Amazon, Cisco, Walmart, and VMware have a large majority of employees working more than 70 hours per week.
- The pressure to overwork and the expectation of being always available are cited as core reasons for the long working hours in India's IT sector.

Security do-over: How Palo Alto Networks sees the reset
- Automation and AI have rendered traditional cybersecurity approaches ineffective as attackers can scale up attacks at unprecedented rates, overwhelming human capabilities.
- Palo Alto Networks suggests consolidating security tools into a single platform for real-time AI operation to simplify operations and enhance security.
- The volatility in global trade policies and supply chains affects IT spending confidence, but cybersecurity investments are seen as more resilient due to the essential role of safeguarding data.
- Cybersecurity market sees growth with a focus on AI-driven outcomes and automation, while a crowded market presents challenges and opportunities for vendors.
- Different vendors like Microsoft, Google, CrowdStrike, and Cisco pose competition in the cybersecurity market, emphasizing the need for integrated security platforms.
- Platformization versus best-of-breed remains a debate in cybersecurity, with Palo Alto's strategy focusing on unified security platforms despite market trends favoring multiple vendors.
- AI's role in cybersecurity is growing, with vendors emphasizing the need for AI-driven threat detection and response to stay ahead of evolving cyber threats.
- Cybersecurity sector is expected to see more competitive AI-driven solutions, where success will depend on efficient data pipelines, seamless integrations, and threat correlation at machine speed.
- Palo Alto's platformization strategy aims to offer simplicity, data efficiency, and reduced latency in threat detection, challenging the momentum of best-of-breed solutions.
- The cybersecurity industry is evolving with a focus on consolidating security stacks and leveraging AI, but challenges such as quantum threats and market competition remain.
- The future of cybersecurity remains uncertain, with providers needing to balance innovation and market demands to succeed in the ever-changing landscape.

Bridging the AI Chasm: The Evolution of Cybersecurity Skills
- Cybersecurity specialists are facing a crisis as cybercriminals utilize AI for fraud and deepfakes, outpacing defenders.
- The skills gap in cybersecurity highlights a significant issue of a mismatch in necessary skills to combat modern threats.
- Cybersecurity professionals need to evolve and acquire AI-driven defense strategies to keep up with attackers.
- Recent cyberattacks like the MOVEit Data Breach and IRLeaks attack emphasize the urgency for better-trained cybersecurity professionals.
- The industry is responding to the AI skills gap by providing enhanced training and certification paths for AI in enterprise security.
- Leading cybersecurity certification providers like EC-Council, ISC2, GIAC, and CISCO are integrating AI-based defense protocols into their programs.
- Tech giants like Microsoft and Google are also investing in cybersecurity training to address the skills gap.
- Cybersecurity professionals must acquire AI expertise quickly to combat cybercriminals' evolving tactics.
- Continuous learning and upskilling are imperative in the cybersecurity field to defend against AI-powered threats.
- The future of cybersecurity lies in ensuring professionals have the necessary skills to protect against AI-driven threats.

Three insights you may have missed from theCUBE’s coverage of MWC25
- Businesses are focusing on AI adoption, automation, and edge computing while maintaining ethics, security, and sustainability.
- The integration of AI and automation is crucial for driving meaningful change in enterprises.
- Telcos are recognizing the potential of AI and the importance of networks in supporting innovation.
- AI-powered automation is transforming enterprise innovation but also raises security and ethical concerns.
- Cisco emphasizes data security amid AI integrations, addressing job displacement and cybersecurity risks.
- Juniper Networks highlights AI-native networking for automating tasks and improving performance.
- IBM focuses on embedding AI directly into business processes for flexible deployment without system overhauls.
- Real-world AI use cases impact player scouting in sports and enhance telecommunications operations.
- AI in telecommunications faces regulatory challenges but AI governance platforms ensure compliance and transparency.
- Broadcom enhances connectivity solutions for AI-powered edge infrastructure to drive enterprise innovation.

How AI and Machine Learning Are Shaping the Future of Business Efficiency?
- Artificial Intelligence (AI) and Machine Learning (ML) are essential in managing the increasing amount of network data being generated daily.
- AI-driven analytics platforms have improved network operations, reducing downtime by 95% and increasing efficiency by 40%.
- Josson Paul has played a significant role in shaping Cisco DNA Center’s Network Data Platform and Assurance, turning raw data into actionable insights for proactive network management.
- Josson Paul's work on AI and ML has optimized network management, reduced downtime, and boosted operational efficiency, improving user experience and security compliance.

Has GetReal cracked the code on AI deepfakes? $18M and an impressive client list say yes
- GetReal, a startup co-founded by Hany Farid, has raised $17.5 million in funding to combat the spread of deepfakes in audio, video, and images.
- The startup is launching a forensics platform as a service with features like threat exposure dashboard, tools for executives' protection, media screening, and deeper analysis.
- Forgepoint Capital is leading the Series A funding, with notable firms like Ballistic Ventures, Evolution Equity, and K2 Access Fund participating.
- The firm has roots in cybersecurity and focuses on cyber-forensics, addressing the lack of expertise in this area.
- GetReal aims to combat malicious deepfakes, which are considered a ubiquitous and serious threat in today's digital environment.
- The technology behind GetReal combines new app functionalities with decades-old techniques developed by Farid for detecting doctored images.
- The startup has received investments from companies like Cisco Investments, Capital One Ventures, and In-Q-Tel, reflecting interest from heavily regulated industries and government entities.
- Industries like financial institutions are showing interest in GetReal's product to combat deepfaked impersonations, with named customers including John Deere and Visa.
- Government officials are also seeking solutions like GetReal to counter deepfake threats in intelligence operations and national security.
- While GetReal's focus is currently on audio, video, and image deepfakes, there are potential plans to expand to address text-based impersonation threats in the future.

Best Cybersecurity Tools for Businesses Using Apple Devices
- With the increasing use of Apple devices in businesses, cybersecurity has become crucial to protect confidential data and prevent cyber threats.
- Key challenges for Apple device users include spyware, phishing attacks, and vulnerabilities in corporate networks that need specialized security tools.
- Malicious programs like keyloggers can compromise business data privacy, emphasizing the importance of regular security audits and specialized security apps.
- For Apple devices, recommended antivirus software includes Norton 360 and Intego Mac Internet Security X9 for comprehensive protection against various threats.
- Data encryption tools like VeraCrypt and FileVault offer secure storage solutions for sensitive files on macOS devices.
- Password managers such as Apple's Passwords App and 1Password help manage and secure credentials across Apple devices with unique features and integrations.
- VPN services like ExpressVPN and Norton Secure VPN provide network connection protection, encryption, and increased privacy for Apple device users.
- Spyware protection tools such as iVerify and Malwarebytes are recommended for detecting and removing suspicious software on iOS and macOS devices.
- For security management and monitoring, tools like Jamf Pro and Cisco Meraki assist in controlling security settings, monitoring device status, and ensuring compliance in an enterprise environment.
- Investing in cybersecurity tools for Apple devices helps reduce cyber risk, data breaches, and builds trust with customers and partners by ensuring reliable data protection.

Cisco Subsidiaries
IMImobile
AppDynamics
WebEx
Cisco Meraki
BroadSoft
Ac Company
Compare Cisco with




















Contribute & help others!
Companies Similar to Cisco












Cisco FAQs
Reviews
Interviews
Salaries
Users/Month