Anomali delivers earlier detection and identification of adversaries in your organization’s network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before any material damage to your organization has occurred.
o Evaluate, standardize, develop and own the common UI framework and modules for the whole company
o Work with Product Designers to define and implement a next generation security platform.
o Write high-performance, reusable, modular code along with automated unit tests.
o Participate in design and code reviews.
o Identify and communicate best practices for front-end engineering.
o Own the user interface and front-end code for the entire application.
o Visualize big data using technologies like D3 and Highcharts.
o Build world-class applications in a responsive way (desktop, tablet, mobile).
o Be the technical expert for the front-end (presentation layer) to the engineering team.
Anomali helps organizations find and respond to cyber threats. That's our mission. We bring to your security team the one thing that's been missing - external context. With Anomali you can now identify suspicious or malicious traffic before it even reaches your network. We turn threat intelligence into your cyber no-fly list, and seamlessly integrate this with your internal security and IT systems.