Employer Active
Job Alert
You will be updated with latest job alerts via emailJob Alert
You will be updated with latest job alerts via emailDescription -
The primary focus of the HP Wolf Security teamis developing cyber security solutions to protect our customersdevices and data. The digital threat landscape is ever-changing and as the cyber security industry reacts and adapts to changes so too do the malware unique micro-virtualization technology ensures that customers are protected from even the most bleeding edge cyber security threats. That micro-virtualization technology forms a key pillar in a wider cyber security suite that were actively developing.
To see what our engineering teams are working on check out our technical blogs: Description for the Technical Author- Security Systems
The candidate is expected to convey the details of the product to the customer. Technical writing translates complex technical concepts into simple language to enable a specific user or set of users to perform a specific task in a specific way. Someone specifically effective in communication requires the skills to produce quality content language format and more. To present appropriate content writers must understand the audience and purpose.
Responsibilities for the Technical Author- Security Systems:
Research and write documents such as deployment guides usage procedures technical notes troubleshooting guides user guides online help.
Keep all assigned documentation components up to date with the development of their respective products while meeting high quality standards.
Gain deep understanding of products and services and translate complex information into simple polished engaging content.
Write user-friendly content that meets the needs of target audience turning insights into language for user success.
Drive the process of having documents reviewed and approved.
Proactively communicate status and issues to facilitate coordination with a global team.
Coordinate and collaborate with product management development testing marketing support and related groups through the product-lifecycle process to collect information meet requirements and assist in product development.
Manage multiple projects and set of contract writers.
Professionally and consistently self-edit own work and assist in editing the work of other team members when necessary.
Meet requirements for speed deadlines and methodology.
Maintain focus on delivering documentation in the most efficient and productive way.
Assisting with the interaction design to enable in-product marketing and feature discoverability.
Requirements for the Technical Author- Security Systems:
5-10 years experience in building and improving commercial enterprise-class online and print-styled software documentation for the full range of end users.
Demonstrable ability to quickly grasp and document technical abstract or advanced concepts clearly to any audience level required by a product.
Demonstrable excellence in technical writing; candidates will be asked to take a writing exam.
Strong experience with solving communication problems for conceptually complex enterprise products especially those including subjects such as IT systems security system software management systems databases and client-server architectures; direct experience with security products is highly desirable.
Deep experience with modern collaborative authoring solutions
Creating content in lightweight markup languages such as Markdown/MD
Distributed version control systems such as git
Experience with web-based documentation systems.
FrameMaker & Adobe Photoshop experience to produce Infographics & diagrams
Exceptional communication skills both verbal and written.
Proven ability with English spelling grammar punctuation syntax and composition rules and a clear business/technical writing style.
Strong editing skills
A great Technical Author will have the following-
Degree in Computer Science or related field
Working knowledge of cloud-native architectures and / or exposure to security systems
Experience with MadCap Flare software
Attention to detail
Able to work under pressure
About you:
Youre out to reimagine and reinvent whats possible- in your career as well as the world around you. So are we. We love taking on tough challenges disrupting the status quo and creating whats next. Were in search of talented people who are inspired by big challenges driven to learn and grow and dedicated to making a meaningful difference.
#LI-Post
Our history:
Inspired by the isolation principles of traditional virtualization our team known then as Bromium created a game-changing technology called micro-virtualization to protect end users against advanced malware. Every task the user performs such as opening a document or clicking on a link is isolated in its own micro-VM with access to just the resources required for that task and existing just for the life of the task. Protection is thus provided through isolation without relying on detection hence reliably defending the user from polymorphic and even zero-day malware.
Bromium was acquired by HP Inc on 19 September 2019 forming HP Wolf Security.
Come to HP and thrive!!
HP is a technology company that operates in more than 170 countries around the world united in creating technology that makes life better for everyone everywhere.
We work to maintain this position while adding new technologies and innovative products to our portfolio. We invent develop and bring to market new technologies and capabilities as well as integrate these technologies into our systems. Our focus is on printing and imaging technologies as well as pursuing broader alternative technologies and research with an eye toward commercial applications. We are dedicated to providing advanced innovative solutions to our partners and customers.
Job -
Engineering ServicesSchedule -
Full timeShift -
No shift premium (United Kingdom)Travel -
Relocation -
Equal Opportunity Employer (EEO) -
HP Inc. provides equal employment opportunity to all employees and prospective employees without regard to race color religion sex national origin ancestry citizenship sexual orientation age disability or status as a protected veteran marital status familial status physical or mental disability medical condition pregnancy genetic predisposition or carrier status uniformed service status political affiliation or any other characteristic protected by applicable national federal state and local law(s).
Please be assured that you will not be subject to any adverse treatment if you choose to disclose the information requested. This information is provided voluntarily. The information obtained will be kept in strict confidence.
If youd like more information about HPsEEO Policyor your EEO rights as an applicant under the law please click here:Equal Employment Opportunity is the LawEqual Employment Opportunity is the Law Supplement
Full-Time