
Akamai Technologies


Working at Akamai Technologies
Company Summary
Overall Rating

19% above

Highly rated for 
Company culture, Work-life balance, Salary
Work Policy




Top Employees Benefits
About Akamai Technologies

At Akamai, our mission is to make digital experiences fast, intelligent, and secure. Our intelligent edge platform surrounds everything, from the enterprise to the cloud. It keeps apps and experiences closer to users — and attacks and threats far away. Top brands globally rely on Akamai as their competitive edge. We help them win in the market through agile solutions that extend the power of their multi-cloud world. Our portfolio of edge security, web and mobile performance, enterprise access, and video delivery solutions is supported by unmatched customer service, analytics, and 24/7/365 monitoring. At Akamai, we see a world of unimagined potential, all enabled through the unique power of the Akamai Edge. It’s this power that creates the agility our customers need to accelerate and secure their multi-cloud world — and own their digital future.
ABECA - AmbitionBox Employee Choice Awards



Akamai Technologies Ratings
Overall Rating





Category Ratings
Company culture
Work-life balance
Salary
Work satisfaction
Job security
Skill development
Promotions
Work Policy at Akamai Technologies



Akamai Technologies Reviews
Top mentions in Akamai Technologies Reviews
Compare Akamai Technologies with Similar Companies
![]() | ![]() Change Company | ![]() Change Company | ![]() Change Company | |
---|---|---|---|---|
Overall Rating | 4.4/5 based on 411 reviews ![]() | 4.1/5 based on 1.7k reviews | 3.5/5 based on 3.1k reviews | 3.6/5 based on 1.4k reviews |
Highly Rated for | Work-life balance Company culture Salary | Work-life balance Company culture Job security | ![]() No highly rated category | Work-life balance |
Critically Rated for | ![]() No critically rated category | Promotions | Promotions Salary Work satisfaction | Promotions Skill development Salary |
Primary Work Policy | Permanent work from home 90% employees reported | Hybrid 91% employees reported | Work from office 79% employees reported | Hybrid 54% employees reported |
Rating by Women Employees | 4.6 Excellent rated by 107 women | 4.1 Good rated by 600 women | 3.6 Good rated by 878 women | 3.7 Good rated by 392 women |
Rating by Men Employees | 4.3 Good rated by 275 men | 4.1 Good rated by 997 men | 3.4 Average rated by 2k men | 3.5 Good rated by 900 men |
Job security | 3.8 Good | 4.0 Good | 3.4 Average | 3.5 Good |
Akamai Technologies Salaries
Senior Software Engineer

Cloud Support Engineer

Software Engineer

Software Engineer2

Platform Operations Engineer

Service Delivery Manager

Technical Solutions Engineer

Senior Software Engineer 2

Software Engineer II

Security Architect

Akamai Technologies Interview Questions
Akamai Technologies Jobs
Akamai Technologies News
'Don’t let LLM's success cloud your judgment': Tech CTO shares hard-hitting AI truths for businesses
- Akamai CTO Robert Blumofe shared insights on avoiding the AI hype cycle at the MIT Technology Review EmTech AI Conference.
- He warned against mistaking early-stage AI use cases for scalable solutions, leading to costly and ineffective deployments.
- Blumofe stressed the importance of looking beyond large language models (LLMs) and implementing various AI tools for different tasks.
- Akamai's democratic approach to AI adoption involves encouraging employee experimentation and innovation.

The HackerNoon Newsletter: Outsmarting Akamais Bot Detection with JA3Proxy (7/19/2025)
- The HackerNoon Newsletter on July 19, 2025, includes top quality stories covering topics like controlling the economy with machines, Indonesia's Web3 ambition, low-code development, and image compression using SVD and TensorFlow Core APIs.
- One of the featured stories is 'Outsmarting Akamais Bot Detection with JA3Proxy' by @pigivinci, which explains how to bypass Akamai's network checks for successful web scraping.

Denial of Service (DoS) Attack — The Cyberbully That Won’t Let You In
- A Denial of Service (DoS) attack occurs when a hacker floods a website with fake requests, making it impossible for real users to access the service.
- Hackers execute DoS attacks to cause chaos, punish a company, seek revenge, or distract security teams while carrying out more malicious activities.
- Different from DDoS (Distributed Denial of Service), which involves multiple computers attacking a system, DoS attacks mainly target websites, servers, or online games.
- To stay safe from DoS attacks, companies can utilize services like Cloudflare or Akamai and build resilient systems to handle high traffic loads.
Disrupting the operations of cryptocurrency mining botnets
- Cybersecurity researchers devised two attack techniques to disrupt the operations of cryptocurrency mining botnets.
- Akamai Researchers uncovered two novel techniques to disrupt cryptocurrency mining botnets by exploiting flaws in common mining topologies.
- Current methods to stop cryptocurrency mining botnets are pool bans or infrastructure takedowns, however, both are slow and complex.
- Researchers developed two techniques exploiting vulnerabilities in the stratum protocol to disrupt operations by targeting proxies or wallets, potentially forcing attackers to abandon campaigns.
- XMRogue tool was developed to disrupt cryptomining botnets using mining proxies by submitting consecutive bad shares and potentially banning the mining proxy from the pool.
- Crafted invalid shares through Stratum to malicious proxies trigger pool-level bans, halting the attacker’s operation.
- In tests conducted by Akamai, one campaign's annual revenue was reduced from $50K to $12K, a 76% drop, by banning proxies.
- Akamai's second method targets miners connected directly to public pools without proxies by flooding the pool with over 1,000 login attempts using the attacker's wallet.
- The disruption can significantly hinder the attack, as the wallet gets temporarily banned for an hour.
- Researchers demonstrated the technique targeting Monero miners, which can be adapted to other cryptocurrencies.
- Defenders can disrupt malicious cryptominer campaigns by exploiting mining pool policies without affecting legitimate miners.
- Attacks targeting wallet addresses added an additional layer of disruption for cryptominers, making it challenging for attackers to monetize effectively.
- Implementing these attack techniques with XMRogue tool helps in disrupting attacker's operations effectively.
- The report concludes that the threat of cryptominers will continue to grow, but defenders now have tools to fight back and make it challenging for attackers to monetize effectively.

Pocket Entertainment elevates Umesh Bude to CTO
- Umesh Bude has been promoted to the position of chief technology officer (CTO) at Pocket Entertainment, the parent company of Pocket FM, Pocket Toons, and Pocket Novel.
- Bude, an alumnus of the National Institute of Technology, Karnataka, has a background in software engineering and has held various roles at companies like SUN Microsystems, Akamai Technologies, and Unacademy.
- He joined Pocket Entertainment in 2024 and has played a significant role in scaling the company's tech stack and will now lead the company's technology vision focusing on AI-powered storytelling.
- In his new role, Bude will oversee the tech strategy across all platforms under Pocket Entertainment, emphasizing on advancing generative AI capabilities and tech-led innovation.
- Bude aims to drive the next wave of innovation with a focus on technology and AI playing a crucial role in storytelling.
- Prateek Dixit, the co-founder of Pocket Entertainment, highlights Bude's leadership as central to creating intelligent, emotionally-aware storytelling experiences.

Cutting cloud waste at scale: Akamai saves 70% using AI agents orchestrated by kubernetes
- Enterprises are expected to waste $44.5 billion on unnecessary cloud spending this year.
- Akamai Technologies faced challenges with a large, complex cloud infrastructure and strict security requirements.
- The company turned to Cast AI, leveraging AI agents within the Kubernetes platform to optimize cost, security, and speed.
- Using Cast AI, Akamai managed to reduce cloud costs by 40% to 70% depending on workload.
- Cast AI's Application Performance Automation (APA) uses machine learning models and reinforcement learning to optimize performance and efficiency.
- APA works through specialized agents that monitor, analyze, and improve application performance, security, efficiency, and cost.
- Integration into existing tools and workflows is supported by Cast AI, ensuring incremental adoption without complete replacement.
- Automation by Cast AI complements human decision-making, maintaining human-in-the-middle workflows.
- Akamai needed a Kubernetes automation platform to optimize cloud costs in real time across multiple clouds while ensuring performance.
- By utilizing Cast AI, Akamai achieved significant time savings by automating infrastructure management.
- Spot instances were effectively utilized by Cast AI for Akamai to reduce costs without manual intervention.

Critical Wazuh bug exploited in growing Mirai botnet infection
- Cybercriminals are exploiting a critical Wazuh vulnerability to spread multiple Mirai variants, the first reported active attacks since the bug was disclosed.
- The vulnerability (CVE-2025-24016) is a remote code execution flaw affecting Wazuh, a widely used open-source XDR and SIEM solution.
- These botnet attacks target IoT devices and exploit various vulnerabilities, including those in routers like TP-Link Archer AX21 and ZTE ZXV10 H108L.
- Akamai researchers found that the botnets, known as Mirai and Resbot, are targeting Wazuh servers with outdated versions, emphasizing the importance of timely software updates.

Mirai botnets exploit Wazuh RCE, Akamai warned
- Akamai researchers warned that multiple Mirai botnets are exploiting the critical remote code execution vulnerability CVE-2025-24016 in Wazuh servers.
- The vulnerability allows for remote code execution on Wazuh servers, and active exploitation of the flaw has been observed via DAPI request abuse.
- Two Mirai botnet variants named 'Resbot' have been exploiting this bug since March 2025, utilizing Italian domain names and targeting IoT devices.
- Indicators of compromise and details on the exploitation of the Wazuh servers by Mirai botnets have been shared by Akamai researchers.

Rawkode's Hands-on Intro to Fermyon Wasm Functions
- Rawkode Academy hosted a hands-on session with Fermyon Wasm Functions featuring David Flanagan and Thorsten Hans.
- Fermyon Wasm Functions is a serverless offering built on Akamai's network, ensuring global availability and low latency.
- Key benefits include lightning-fast cold starts, global distribution simplicity, and a familiar developer experience.
- Features include easy deployment, advanced monitoring, cron jobs support, CDN integration, and portability across platforms.

TikTok isn’t really working right now
- TikTok is facing issues with some kind of outage, as reported by many users just after 11PM ET.
- Although TikTok is not completely offline, it's experiencing difficulties with features like comments and account switching.
- When trying to access the TikTok website, users are greeted with an error message and reference code.
- There has been no official update from TikTok on the cause of the issue, and service providers like Akamai and Oracle are not showing any wider problems.


Compare Akamai Technologies with




















Contribute & help others!
Companies Similar to Akamai Technologies










Akamai Technologies FAQs


Reviews
Interviews
Salaries
Users

