Anomali delivers earlier detection and identification of adversaries in your organization’s network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before any material damage to your organization has occurred.
·Define business and technical requirements for the product features managed by you across cloud and on-premise platforms
·Manage the product for its entire lifecycle from concept, proposal, planning, development, launch, release and post sales engagement
·Sustained engagement with customers and markets, learn about needs, educate about product, inform about strategy and listen to the feedback
·Be responsible for the success of your products, analyze business results, develop strategic options, get stakeholder agreement and execute the strategy
·Continuous communication with internal and external stakeholders, especially with executives and sales teams
·Provide thought leadership on innovation, customer experience, product strategy and future direction of the market
·Help drive a user experience centered product roadmap and requirements
·2+ years’ experience in product related roles (product management, product marketing, engineering, etc)
·Some development experience is required (preferably Python)
·BS in computer science or similar
·Prior work with products in cloud/SaaS platforms is preferred
·Understanding of agile methodologies is strongly preferred
·Must possess excellent communication & presentation skills and the ability to get your point across clearly
·Candidate must have a winning attitude and perseverance
Anomali helps organizations find and respond to cyber threats. That's our mission. We bring to your security team the one thing that's been missing - external context. With Anomali you can now identify suspicious or malicious traffic before it even reaches your network. We turn threat intelligence into your cyber no-fly list, and seamlessly integrate this with your internal security and IT systems.