We like challenges. We believe that the right security solution could be a game changer in the way enterprises work and address
threats in the future. We believe our solution will forever transform the security space.
We are looking for smart people who collaborate, innovate and make great security products. The right candidates fit this profile: Positive analytical problem-solving mindset. Ability to work and learn in a fast-paced, demanding, dynamic environment. Excellent organization skills and attention to detail. Excellent communication skills. Willingness to both collaborate and work independently in a friendly respectful professional environment.
About the Role: We are looking for a researcher to perform offensive operations and grow the value we deliver to our defensive security team. If you are a Red-Teamer and forensic expert, we are hiring.
Note: this is not an entry level position. A minimum of 5+ years demonstrable security research experience is required.
Create PoCs (proofs of concept) to simulate real world attacks in a controlled environment.
Perform full scope Adversarial Simulation / Red Team assessments
Provide support in an ongoing assessment by writing tools and setting up infrastructure
Carefully document the different phases of the kill chain for later root-cause analysis
Present findings to internal & external stakeholders
Publishing research on new threats
Mentor others on your tradecraft
Working knowledge real-world malware and APT attacks.
Familiarity with the threat landscape for all OSs (Windows, Linux, and Mac.)
Master’s degree or foreign academic equivalent in Electrical & Computer Engineering, Computer Science, Computer Engineering, Computer Science & Engineering, or related field
Coursework or experience in Cyber Security, Network Security, Graph Networks, and Embedded Systems Designd
We're always interested in talking to talented passionate people who want to make a big impact.
If you don't see a relevant position, contact us with your resume and a cover letter using the button below.