We value clear thinking, strong technical fundamentals, and calm execution under pressure.
Strong Linux, identity, networking, hardening, and defensive architecture fundamentals required.
Apply by emailStrong malware analysis, reverse engineering, and scripting fundamentals required.
Apply by emailStrong log analysis, detection engineering, and hunting fundamentals required.
Apply by email