
Cisco

Working at Cisco
Company Summary
Overall Rating

14% above

Highly rated for 
Work-life balance, Company culture, Salary
Work Policy




Top Employees Benefits
About Cisco

Cisco (NASDAQ: CSCO) enables people to make powerful connections--whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible--providing easy access to information anywhere, at any time. Cisco was founded in 1984 by a small group of computer scientists from Stanford University. Since the company's inception, Cisco engineers have been leaders in the development of Internet Protocol (IP)-based networking technologies. Today, with more than 71,000 employees worldwide, this tradition of innovation continues with industry-leading products and solutions in the company's core development areas of routing and switching, as well as in advanced technologies such as home networking, IP telephony, optical networking, security, storage area networking, and wireless technology. In addition to its products, Cisco provides a broad range of service offerings, including technical support and advanced services. Cisco sells its products and services, both directly through its own sales force as well as through its channel partners, to large enterprises, commercial businesses, service providers, and consumers.

ABECA - AmbitionBox Employee Choice Awards



Cisco Ratings
Overall Rating





Category Ratings
Work-life balance
Company culture
Salary
Skill development
Work satisfaction
Job security
Promotions
Work Policy at Cisco



Cisco Reviews
Top mentions in Cisco Reviews
Compare Cisco with Similar Companies
![]() | ![]() Change Company | ![]() Change Company | ![]() Change Company | |
---|---|---|---|---|
Overall Rating | 4.2/5 based on 2k reviews ![]() | 4.0/5 based on 1.6k reviews | 3.8/5 based on 2.4k reviews | 4.2/5 based on 2k reviews |
Highly Rated for | Work-life balance Company culture Skill development | Work-life balance Job security Company culture | ![]() No highly rated category | Work-life balance Company culture Skill development |
Critically Rated for | ![]() No critically rated category | Promotions | Promotions Job security | ![]() No critically rated category |
Primary Work Policy | Hybrid 72% employees reported | Hybrid 92% employees reported | Work from office 69% employees reported | Hybrid 58% employees reported |
Rating by Women Employees | 4.2 Good rated by 404 women | 3.9 Good rated by 423 women | 3.3 Average rated by 234 women | 4.2 Good rated by 217 women |
Rating by Men Employees | 4.2 Good rated by 1.4k men | 4.0 Good rated by 1.1k men | 3.8 Good rated by 2k men | 4.2 Good rated by 1.3k men |
Job security | 3.5 Good | 4.1 Good | 3.2 Average | 4.0 Good |
Cisco Salaries
Software Engineer

Technical Consulting Engineer

Senior Software Engineer

Network Engineer

Technical Lead

Network Consulting Engineer

Software Developer

Software Engineer III

Project Manager

Softwaretest Engineer

Cisco Interview Questions
Cisco Jobs
Cisco News
The Good, the Bad and the Ugly in Cybersecurity – Week 26
- DoJ charges British national 'IntelBroker' for $25 million data theft, facing severe penalties.
- APT28 utilizes Signal in malicious campaign targeting Ukrainian government entities, deploying BeardShell malware.
- China-linked Salt Typhoon expands cyber espionage to Canadian telecoms, exploiting Cisco vulnerability.
- Salt Typhoon breach includes interception of sensitive network traffic in major Canadian telecom.
- Authorities warn of continued Salt Typhoon cyberattacks against large organizations in 2026.

British man behind ‘IntelBroker’ hacker group charged with stealing millions
- A British man named Kai West has been charged by US law enforcement for allegedly hacking numerous organizations worldwide as part of the 'IntelBroker' cybercrime group, causing over $25 million in damages.
- West faces potential sentences of up to 20 years in prison for wire fraud and conspiracy to commit computer intrusions. The IntelBroker group targeted around 40 victims globally, including well-known firms such as AMD, Apple, and CISCO.
- The group's scheme, which allegedly ran from December 2022 to February 2025, involved selling stolen data to collect approximately $2 million. West, arrested in France, is currently facing extradition to the US.
- Authorities traced West to IntelBroker through a purchase of stolen data, linking his real identity via a cryptocurrency transaction and his Gmail account. This case highlights the FBI's efforts to combat cybercriminals globally.

Enterprises must rethink IAM as AI agents outnumber humans 10 to 1
- Stolen credentials cause 80% of breaches, driving shift towards Identity as AI control plane.
- Vendors adapt to handle one million AI identities, pushing for better authentication.
- Microsoft, Okta, Cisco, CrowdStrike, and Palo Alto Networks drive identity security transformation.
- Architectures evolve for AI threat, requiring zero trust, biometrics, and proximity verification.
- Security priorities demand continuous identity verification to prevent breaches in AI-driven environments.

OpenAI's Codex Aims to Ease Programmers' Headaches
- OpenAI’s Codex has revolutionized coding by transforming natural language into functional code, allowing developers to focus on designing sophisticated systems.
- Codex represents a paradigm shift in software creation, transitioning from sequential to parallel development processes.
- As a cloud-based AI coding assistant, Codex collaborates with developers, taking on tasks independently and running multiple tasks simultaneously.
- Codex goes beyond autocomplete, understanding context and generating syntactically correct code snippets, enabling developers to focus on the 'what' and 'why' rather than the 'how.'
- By handling repetitive tasks, Codex enhances mental bandwidth, allowing senior developers to think critically about system behavior and long-term maintainability.
- Furthermore, Codex reduces context switching by providing a consolidated space for various coding tasks, leading to more sustained periods of focus and creative problem solving.
- Codex usage examples include designing architectures, debugging with a thinking partner, and exploring new paradigms, benefiting developers with streamlined workflows and accelerated learning.
- Real-world use cases of Codex include tasks like refactoring, prototyping, feature development, and test writing in companies like OpenAI, Cisco, and Temporal.
- Overall, Codex by OpenAI elevates developers to take on more strategic roles, guiding AI collaborators, and shaping the future of software development.
- Codex represents a significant advancement in AI-powered coding tools, empowering developers to focus on innovation and problem-solving.

DoorDash Executive Among 8 Killed in Lake Tahoe Accident
- A tragic boat accident on Lake Tahoe claimed the lives of 8 people, including a DoorDash executive and his family members.
- The accident occurred when a 27-foot powerboat capsized, resulting in 8 fatalities and 2 survivors.
- Among the deceased were Josh Pickles, a DoorDash executive, his parents, and his uncle.
- Other individuals killed in the accident were identified by the El Dorado County sheriff's office.
- The group was celebrating a birthday when their boat overturned due to a powerful microburst storm.
- Josh Pickles' wife, Jordan Sugar-Carlsgaard, was not on the boat and stayed on shore with their 7-month-old daughter.
- The couple had homes in Tahoe and the Bay Area.
- Josh Pickles had a background in strategic sourcing and procurement, having worked at DoorDash, Salesforce, and Cisco Systems.
- DoorDash expressed deep sorrow over the loss of Josh Pickles, highlighting his positive impact on the team.
Google donates the Agent2Agent Protocol to the Linux Foundation
- Google has donated the Agent2Agent Protocol to the Linux Foundation, a technology for AI agent interactions.
- The donation was announced at the Open Source Summit North America conference in Denver.
- Google aims to accelerate adoption of the A2A protocol for open collaboration and development.
- The A2A Protocol facilitates interactions between AI agents to automate tasks.
- Developers no longer need to write custom code as A2A provides prepackaged features for data movement.
- A2A can assist agents in processing prompts, collaborating on complex tasks, and sharing data in JSON format.
- The protocol enables sharing of text and multimodal data efficiently and securely.
- A2A uses the JSON-RPC 2.0 protocol for moving JSON files between agents.
- Google has provided three modes for sharing files and instructions between agents using A2A.
- A2A complements the Model Context Protocol for interactions between agents and other applications.
- Accompanying software development kits and tooling are also donated to the Linux Foundation.
- Companies like Amazon Web Services, Cisco, Microsoft, and others support the A2A project.
- A2A's move to the Linux Foundation aims for long-term neutrality and collaboration in agent-powered productivity.

Qunnect gets $10M to help build the quantum internet
- Qunnect Inc. has secured $10 million in funding to develop a quantum internet network backed by Cisco Systems Inc. and Airbus Ventures.
- The startup aims to leverage quantum physics to enable quantum computers to scale and achieve 'quantum advantage.'
- Qubits, the building blocks of quantum computers, are incredibly sensitive and difficult to scale, which Qunnect plans to address.
- Qunnect's approach involves connecting smaller quantum machines into a distributed system rather than building larger quantum computers.
- Their technology uses quantum networking hardware to entangle remote qubits, allowing for instant connections regardless of distance.
- The Carina product suite by Qunnect supports quantum communications and enables synchronization of qubits for efficient computations.
- Qunnect's quantum networking solutions have applications in areas like global trading, secure communications, and location verification.
- Cisco's investment in Qunnect aligns with its quantum networking strategy to deploy real-world quantum networks on existing telecom infrastructure.
- Qunnect has already delivered its Carina hardware to customers in various industries and demonstrated its technology in New York City and Berlin testbeds.
- The collaboration between Qunnect and Cisco aims to build the infrastructure for a functioning quantum internet.

How CISOs became the gatekeepers of $309B AI infrastructure spending
- Enterprise AI infrastructure spending is projected to reach $309 billion by 2027, with success dependent on controlling the infrastructure layer for operational scalability.
- Security vendors like Palo Alto Networks, CrowdStrike, and Cisco are seeing significant growth in AI-driven security revenue amid declining traditional infrastructure sales.
- The complexity of AI workloads is straining existing infrastructure, with enterprises requiring new approaches to manage AI at scale.
- 73% of enterprises cite infrastructure inadequacy as the primary barrier to AI adoption, while adversaries are leveraging AI faster than defenses can be deployed.
- AgenticOps sees traditional IT operations insufficient for managing AI agents at machine speed, with a focus on unified data access, collaborative environments, and purpose-built models.
- Security is becoming an accelerant to AI adoption, with traditional firewalls unable to protect AI workloads effectively.
- Silicon-embedded security with nanosecond latency is transforming security measures, significantly outperforming software-defined approaches.
- Automated platforms for vulnerability management offer rapid response, reducing breach risk and delivering ROI in under 5 months.
- Observability is crucial for AI infrastructure success, with generative UI and real-time interfaces shaping the future.
- The AI infrastructure market is consolidating, with Gartner predicting a reduction to fewer than 20 platforms by 2027, emphasizing the need to control the full stack to stay relevant.

China-linked APT Salt Typhoon targets Canadian Telecom companies
- Canada and FBI warn of China-linked APT Salt Typhoon cyber espionage targeting Canadian telecom firms.
- Salt Typhoon hacking campaign active for 1–2 years, targeting telecom providers in several countries.
- In February 2025, Insikt Group reported ongoing Salt Typhoon attacks globally, breaching U.S. telecom providers.
- Chinese hackers exploited Cisco flaws CVE-2023-20198 and CVE-2023-20273.
- PRC-linked Salt Typhoon likely hacked Canadian telecom devices using exploits for data theft.
- Canada warns of ongoing cyber activities targeting telecom companies by state-sponsored actors.
- Salt Typhoon group conducts network reconnaissance beyond telecoms, with espionage anticipated for coming years.
- State-sponsored hackers, particularly from China, focus on telecom providers for valuable data collection.
- In 2024, Salt Typhoon breached telecom companies globally, compromising U.S. firms for metadata collection.
- Reports indicate Salt Typhoon also targeted satellite firm Viasat.

Google Hands Over Agent2Agent AI Protocol to the Linux Foundation
- The Linux Foundation launched the Agent2Agent (A2A) project at the Open Source Summit North America, receiving the A2A protocol from Google for open standard AI agent interoperability.
- A2A allows AI agents to securely communicate and collaborate across different platforms, frameworks, and vendors, with support from companies like AWS, Cisco, Microsoft, Salesforce, SAP, and ServiceNow.
- The protocol addresses the need for agents to work together in dynamic environments and infrastructure.
- The Linux Foundation will govern the A2A project, promoting neutrality, collaboration, and long-term growth.
- A2A offers SDKs and tooling to aid developers in creating cross-compatible agents and avoiding vendor lock-in.
- Google Cloud's VP highlighted the importance of the A2A protocol for enabling open communication standards in AI.
- The collaboration with the Linux Foundation and technology providers aims to drive innovation in AI capabilities under an open-governance framework.
- The A2A project under the Linux Foundation will prioritize extensibility, security, and usability, with plans to develop additional agent standards.
- The goal of contributing A2A to an open ecosystem is to expedite enterprise adoption of intelligent agentic systems.
- Developers and organizations are encouraged to engage with the A2A project through its GitHub page.


Cisco Subsidiaries

IMImobile

AppDynamics

WebEx

Cisco Meraki

BroadSoft

Ac Company
Compare Cisco with




















Contribute & help others!
Companies Similar to Cisco












Cisco FAQs


Reviews
Interviews
Salaries
Users

