No location provided
•
Today
Are you driven to conduct rapid experiments with the latest in artificial intelligence? At Corelight, we hold a firm conviction that a robust cybersecurity posture begins with the network. While adversaries may bypass endpoint detection, firewalls, and other security layers, they cannot erase their digital footprints on the networks they traverse. Our solutions, built upon the open-source innovations of Zeek, Suricata, and YARA and refined through extensive real-world application, transform the
Full-time