Working as a Security Researcher
What's it like to work as a Security Researcher? Read testimonies from real people who work as a Security Researcher—everything from work-life balance to career satisfaction. Hear from an expert and see top companies to work for as a Security Researcher.
Security Researcher Ratings
271 Security Researcher reviews for 167 companies
107 Security Researcher Jobs
Security Researcher Reviews
Top Companies for Security Researcher
Huawei is a global leader of ICT solutions. Continuously innovating based on customer needs, we are committed to enhancing customer experiences and creating maximum value for telecom carriers, enterprises, and consumers. Our telecom network equipment, IT products and solutions, and smart devices are used in 170 countries and regions. In 2017, The company's total annual revenue was CNY603.6 billion (US$92.5 billion) based on year-end exchange rates, an increase of 15.7% over 2016. Net profits were CNY47.5 billion (US$7.3 billion), an increase of 28.1% year-on-year. In 2017, Huawei's annual investment in research and development reached CNY89.7billion (US$13.8 billion), up 17.4% compared with 2016. The company's total R&D spend over the past decade has exceeded CNY394 billion (US$60.4 billion). More than 45% of our 180,000 employees engage in R&D. A synergy was created between our Huawei and Honor brands. In 2017, Huawei shipped a total of 153 million smartphones (including Honor phones). We are firmly positioned among the top three phone makers in the world. We released the HUAWEI Mate 10 – the first smartphone with an embedded AI chipset. The Huawei Innovation Research Program (HIRP) has involved over 400 research institutions and 900 companies in more than 30 different countries and regions. We collaborate on joint innovation projects relating to 5G algorithms, AI technology, network intelligence, nanomaterials, and other cutting-edge technologies. These efforts in technological innovation helped us make breakthroughs and drive industry development and business success. Leveraging our experience and expertise in the ICT sector, we help bridge the digital divide and promote high-quality broadband connectivity for all. As an advocate of socioeconomic sustainability, we make every effort to support secure and stable network operations, and help customers and industries improve efficiency to drive low-carbon economic growth. By localizing our operations and building a global value chain, we help local innovators maximize their global value and share win-win outcomes.
From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure. We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines purpose-built ASICs, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration. Our flagship enterprise firewall platform, FortiGate, is available in a wide range of sizes and form factors to fit any environment, and provides a broad array of next generation security and networking functions. Complementary products can be deployed with a FortiGate to enable a simplified, end-to-end security infrastructure.
V-Key focuses on cutting-edge mobile phone security research and development, studying the latest advanced attacks against mobile phones and inventing solutions to defend against them. Our solutions allow businesses to roll out cloud-based payments, trusted authentication for mobile banking, and other secured mobile applications for user data protection without the need to use any form of hardware secure elements. After all, software security is the new hardware. Using FIPS 140-2 certified algorithms for cryptographic assurance, our solutions have been accredited and accepted by multiple government agencies and regulatory bodies globally. Traditional tamper-protection relies on techniques such as code obfuscation, whitebox cryptography, and anti-tampering / anti-debugging mechanisms. V-Key tightly integrates these best-of-breed techniques into the V-OS virtual machine in a groundbreaking manner in order to create a reinforcing system of protection.