Cisco
Working at Cisco
Company Summary
Overall Rating

14% above

Highly rated for
Work-life balance, Company culture, Salary
Work Policy




Top Employees Benefits
About Cisco

Cisco (NASDAQ: CSCO) enables people to make powerful connections--whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time. Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services. Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers.
AmbitionBox Best Places to Work in India Awards
Cisco Ratings
Overall Rating
Category Ratings
Work-life balance
Company culture
Salary
Skill development
Work satisfaction
Job security
Promotions
Work Policy at Cisco
Cisco Reviews
Top mentions in Cisco Reviews
Compare Cisco with Similar Companies
Change Company | Change Company | Change Company | ||
---|---|---|---|---|
Overall Rating | 4.2/5 based on 1.9k reviews | 4.0/5 based on 1.5k reviews | 3.8/5 based on 2.2k reviews | 4.2/5 based on 2k reviews |
Highly Rated for | Work-life balance Company culture Skill development | Work-life balance Job security Company culture | No highly rated category | Work-life balance Company culture Skill development |
Critically Rated for | No critically rated category | Promotions | Promotions Job security | No critically rated category |
Primary Work Policy | Hybrid 70% employees reported | Hybrid 93% employees reported | Work from office 68% employees reported | Hybrid 62% employees reported |
Rating by Women Employees | 4.2 Good rated by 374 women | 4.0 Good rated by 401 women | 3.4 Average rated by 224 women | 4.3 Good rated by 207 women |
Rating by Men Employees | 4.2 Good rated by 1.4k men | 4.1 Good rated by 1k men | 3.8 Good rated by 1.9k men | 4.2 Good rated by 1.3k men |
Job security | 3.6 Good | 4.1 Good | 3.2 Average | 4.0 Good |
Cisco Salaries
Software Engineer
Senior Software Engineer
Technical Consulting Engineer
Network Engineer
Software Developer
Network Consulting Engineer
Technical Lead
Software Engineer III
Consultant Engineer
Softwaretest Engineer
Cisco Interview Questions
Interview questions by designation
Top Cisco interview questions and answers
Cisco Jobs
Cisco News
The top companies you want on your résumé if you work in cybersecurity, according to recruiters
- Cybersecurity recruiters recommend having top companies on your résumé for job opportunities in the field.
- The companies can vary based on the sector of cybersecurity one works in.
- Recruiters highlighted names like Palo Alto Networks, the NSA, Big Tech, and the Big Four consulting firms.
- While having the right skills is crucial, a strong company name can enhance credibility.
- Entry-level candidates may benefit from working at smaller companies to gain a broader understanding of cybersecurity.
- Well-known companies can offer credibility and leadership experience as one progresses in their career.
- In cybersecurity, success is not solely tied to major tech giants, allowing for versatility in various industries.
- Recruiters emphasized that skills and experience play a significant role in determining talent, considering the sector of cybersecurity.
- Companies like Palo Alto Networks, Cisco, Crowdstrike, federal agencies, Big Tech firms, and the Big Four consulting firms were mentioned as powerful names on résumés.
- Experience with government agencies like the NSA or contractors for the Department of Defense is highly regarded in the cybersecurity field.
Who is Colette Kress? Meet the Nvidia CFO who has overseen the chipmaker's meteoric rise
- Colette Kress is the CFO of Nvidia and has overseen the company's massive growth amid the AI boom.
- She played a key role in guiding Nvidia to become one of the world's most valuable companies.
- Kress holds a bachelor's degree in finance and has a strong career history with companies like Microsoft, Cisco, and Texas Instruments.
- In 2024, Nvidia's market cap surpassed $3 trillion, and Kress had a compensation of $13.3 million in 2023.
Cisco and Google Cloud Unveil Advanced SD-WAN Connectivity Solution
- Cisco and Google Cloud have partnered to provide an integrated SD-WAN solution for global enterprises.
- The solution combines Cisco's enterprise-grade SD-WAN with Google Cloud's fully managed Cloud WAN.
- This integration enables businesses to connect data centers and branch offices directly to Google Cloud workloads over a private global network.
- The joint offering aims to enhance security, performance, and reliability for cloud connectivity in a simplified and agile manner.

Driving energy efficiency through the network
- The network infrastructure, often overlooked for sustainability, presents a significant opportunity for driving sustainability through practical steps.
- Implementing Power over Ethernet (PoE) policies on switches can optimize power delivery to reduce excess energy consumption in networking.
- Optimizing power sharing between devices and incorporating automation can further enhance energy efficiency in networks.
- Automation through scripts can power down unused switch ports and adjust building infrastructure based on real-time usage patterns.
- Data-driven insights from platforms like Cisco Spaces help improve building usage, reduce energy waste, and lower costs.
- Transitioning to direct DC power sources in networking infrastructure can eliminate inefficiencies from AC to DC conversion, improving energy efficiency.
- Incorporating renewable energy sources like solar power cells can offset network power consumption and reduce reliance on traditional power grids.
- By optimizing power delivery and embracing renewable energy, organizations can build more sustainable, cost-effective networking infrastructures.
- As technology evolves, networking solutions will integrate sustainability features, enabling organizations to build greener, more efficient IT infrastructures.
- IT leaders should start with small changes, explore new technologies, and prioritize sustainability for innovation and environmental practices.

SONiC: The open source network operating system for modern data centers
- Software for Open Networking in the Cloud (SONiC) is an open-source network operating system developed in the Open Compute Project in 2016, gaining popularity in hyperscalers and hardware vendors like Broadcom and Cisco.
- SONiC's modular architecture uses containerized microservices for network functions like DHCP, BGP, and QoS, ensuring stability and flexibility with a centralized Redis database.
- SONiC's compatibility with various hardware vendors and its diverse community of over 850 members drive its capabilities and adoption, supported by enterprise services.
- The Switch Abstraction Interface (SAI) is crucial for SONiC and other network operating systems, offering a standardized API for controlling network hardware from different vendors.
- SONiC's adoption by companies like Microsoft and Alibaba showcases its scalability and efficiency, yet it lacks some features for enterprise private data centers and faces challenges with image footprint and reliability.
- Canonical's efforts to support SONiC on Ubuntu address limitations, providing LTS support for stability, security, integration with MAAS, improved compatibility with hardware vendors, and reduced image footprint.
- Canonical's collaboration with the SONiC community, hardware vendors, and enterprise customers aims to enhance SONiC's stability, security, and scalability, accelerating its adoption in data centers globally.
- Collaboration with Canonical can bring the power of Ubuntu to SONiC-based networking solutions, offering an open, adaptable, and cost-effective option for modern data center networking.

Breakthrough: UK’s First Long-Distance Ultra-Secure Communication Achieved via Quantum Network
- Researchers in the UK have achieved a breakthrough in quantum communications, establishing the country's first ultra-secure long-distance communication network.
- The network integrates various quantum technologies to ensure secure data transfer over long distances, highlighting advancements in quantum applications and secure communication.
- By utilizing quantum key distribution and distributed entanglement, the network enhances security by embedding encryption keys within light particles, making them highly secure.
- Live demonstrations showcased the network's capabilities, including secure video conferencing and data transfer between Bristol and Cambridge over 410 kilometers.
- This achievement is crucial in the face of evolving cyber threats, emphasizing the importance of quantum security measures in communication infrastructure.
- The UK's network contrasts with China's by focusing on pragmatic integration within existing infrastructure, marking a significant milestone in quantum networking.
- Funded by EPSRC, the project aims to bolster the UK's position in quantum technology through collaboration with companies like Toshiba and Cisco.
- The scalable quantum network signifies a shift towards quantum-secured communication, showcasing the UK's prowess in the global quantum technology landscape.
- The achievement underscores the potential for quantum internet, promising secure data exchange and resilience against cyber threats in the future.
- Researchers express enthusiasm for the collaborative effort and the network's implications for secure data exchange and cybersecurity.

DAZN Pirate IPTV Action Coincided With Massive Public DNS Blockade
- Belgian ISPs blocked around 100 illegal streaming sites and five pirate IPTV providers after football broadcasters DAZN and 12th Player obtained authorization from a local court.
- DAZN described the action as a significant step forward in combating content piracy in Belgium, representing a unique and groundbreaking approach.
- The enforcement measures strategically disrupted live match streams during a crucial point in the Belgian football championship play-offs.
- Dynamic blocking, authorized by the Brussels Enterprise Court, enables swift responses to countermeasures without the need for additional legal procedures.
- The rightsholders aimed to impede circumvention tactics by users in Belgium switching DNS providers, targeting Cloudflare, Google, and Cisco to block DNS resolvers.
- Legislation in Belgium introduced in 2022 enhanced anti-piracy efforts, enabling expedited judicial proceedings and the deployment of dynamic blocking mechanisms.
- A notice from the Belgian Online Anti-Piracy & Illegal Gambling Office referenced a regulatory order to block public DNS resolvers associated with copyright infringement claims against pirate streaming sites.
- Site-blocking actions have a long history in Belgium, with recent efforts led by DAZN and 12th Player significantly increasing the volume and effectiveness of such measures.
- Local ISPs in Belgium have been implementing site-blocking measures in collaboration with rightsholders, with penalties of €100,000 per day set for non-compliance to the dynamic blocking order.
- The success of blocking measures raises questions about their effectiveness in targeting the root of the issue by removing or targeting the infringing content streams.
Signalgate solved? Report claims journalist’s phone number accidentally saved under name of Trump official
- A report claims that journalist Jeffrey Goldberg's phone number was accidentally saved under the name of a Trump official, causing it to be included in a Signal group chat.
- During the 2024 US election campaign, Goldberg's inquiries reached Trump campaign staffer Brian Hughes, who shared them with US national security adviser Mike Waltz.
- Waltz then mistakenly saved Goldberg's phone number under Hughes' contact, leading to Goldberg being added to the group discussing a planned attack on Houthi rebels.
- The use of Signal by Trump administration officials instead of secure government channels raised concerns about information security and record-keeping violations.
- Google's Quick Share software faced vulnerabilities in the Windows version, with fixes being reported as inadequate by researchers at SafeBreach.
- The vulnerabilities, dubbed 'QuickShell,' could be exploited for full remote code execution, prompting Google to issue multiple fixes.
- Apache addressed a critical vulnerability in its Parquet file format, while Cisco warned of flaws in its Smart Licensing Utility being exploited.
- A bug bounty program for security researchers was launched by Nivenly for Fediverse projects, offering rewards for identifying vulnerabilities in open-source software.
- Baltimore city government fell victim to a vendor impersonation scam, losing nearly a million dollars in a fraudulent scheme.
- Critical vulnerabilities in the 'WP Ultimate CSV Importer' WordPress plugin were reported, including an arbitrary file upload flaw that could lead to core file deletion.

Evolving internet connectivity in the Philippines
- The evolution of internet connectivity in the Philippines has transformed how individuals connect, learn, and conduct business.
- Dial-up connections, using telephone lines and modem technology, were prevalent in the 1990s but had slower speeds.
- The Philnet project in 1994 marked the country's initial connection to the global internet through a Cisco router.
- Broadband connections, utilizing Digital Subscriber Line technology, offered faster speeds and simultaneous voice and data services.
- Manila's broadband speeds in 2025 recorded significant rates, emphasizing the importance of robust internet infrastructure.
- Fiber optic internet, with optic cables enabling rapid data transmission, has further enhanced network speeds and user experience.
- The adoption of 5G technology in the Philippines revolutionized digital connectivity with high speeds and expanded capacity.
- 5G networks facilitate faster and reliable connectivity, driving sustainability across various sectors like agriculture and energy.
- Satellite internet, utilizing LEO satellites, is gaining prominence in providing broadband services nationwide.
- Satellite internet has been particularly beneficial during natural calamities, aiding communication in remote areas.

Cisco: Fine-tuned LLMs are now threat multipliers—22x more likely to go rogue
- Weaponized large language models (LLMs) fine-tuned with offensive tradecraft are reshaping cyberattacks, automating reconnaissance, social engineering, and more.
- Models like FraudGPT, GhostGPT, and DarkGPT enable attack strategies like phishing and code obfuscation, available for as low as $75 monthly.
- Cybercrime entities exploit revenue opportunities through leasing access to weaponized LLMs, resembling legitimate SaaS businesses.
- The blurring lines between developer platforms and cybercrime kits indicate a rapid evolution in AI-driven threats.
- Fine-tuned LLMs are increasingly vulnerable to producing harmful results, as reported by Cisco’s AI Security Report.
- The process of fine-tuning LLMs creates potential security weaknesses, exposing them to attacks like data poisoning and model inversion.
- Legitimate LLMs are now at risk of exploitation and integration into cybercriminal tool sets, increasing their susceptibility.
- Fine-tuning destabilizes alignment, compromising safety controls especially in sensitive domains governed by strict compliance regulations.
- The rise of black-market weaponized LLMs like GhostGPT and FraudGPT sold for $75/month poses significant threats to enterprises.
- Cisco's research highlights the need for real-time visibility, adversarial testing, and fortified security measures to combat evolving cyber threats.

Cisco Subsidiaries
IMImobile
AppDynamics
WebEx
Cisco Meraki
BroadSoft
Ac Company
Compare Cisco with




















Contribute & help others!
Companies Similar to Cisco












Cisco FAQs
Reviews
Interviews
Salaries
Users/Month