This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a Windows Low Level Engineer in Prisma Access, you will architect, design, and build the next-generation Prisma Access agent, redefining secure connectivity for the modern remote workforce. This is a unique opportunity to take charge of a new product architecture from its inception, utilizing up-to-date technology to impact tens of millions of users. You will be instrumental in creating a new approach to connectivity, compliance, and security in a world of loosely defined perimeters and cloud-native applications.
Job Responsibility:
Lead the architecture, design, and implementation of a new, high-impact product from the initial stages
Design, implement, and test critical C/C++ components, including kernel drivers and user-mode OS-related infrastructures
Collaborate closely with cross-functional and multi-platform teams to share knowledge and ensure product alignment
Participate in researching advanced technologies and analyze their implications on connectivity and security
Investigate and adapt new technologies for integration into the company's product portfolio
Author comprehensive design documents, development guidelines, and engineering best practices
Requirements:
Bachelor's degree in Computer Science, a related field, or equivalent practical experience
5+ years of experience as a software engineer
Proven experience with multi-threaded development under the Windows operating system
High proficiency in system-level C++ programming, including C++17 and later versions
Demonstrated high standards for secure coding practices and strong attention to detail
Nice to have:
Experience in low-level kernel-mode development
Knowledge of Windows networking (NDIS, WFP, Filter, Miniport, File System, Winsock)
Experience with networking protocols such as TCP/UDP, QUIC, MASQUE, ICE, and Proxy PAC
Experience with undocumented APIs and reverse engineering