WORK WITH US

HOORAY! THERE ARE 3 OPEN POSITIONS:
TIME TO START YOUR CAREER

LEARN MORE

Background

Do you have what it takes?

Being a security expert is not easy.

Please fill in the form and we will be happy to evaluate your skills.
If you’ll be compliant with the requirement, we will get in touch very soon for an interview.


See open positions

    Call me backEmail me back


    Cyber Threat Hunter

    The Cyber Threat Hunter will be responsible for participating in threat actor-based investigations to detect, disrupt and eradicate the presence of threat actors from enterprise networks. To meet this goal, you will utilize the latest in cyber security technology and Cyber Threat Intelligence to support customers with proactive Computer Network Defense protection.


    • Industry recognized certification
    • Malware and Fusion analysis techniques
    • lateral movement methods, foothold tactics, and data exfiltration techniques.

    • Detection Engineering
    • Incident Response
    • Digital forensics.

    Incident Response Analyst

    The individual we are seeking has previous experience in the triage and in-depth analysis of security events as well as knowledge around developing new detections that keeps us at pace with the latest threats and attacker techniques.

    check Active participant in the 24/7 Blue Team operation.

    check Provide monitoring, triage and analysis of security events.

    check Act as incident responder for potential incidents identified.

    check Perform forensic analysis and gather evidence.

    check Develop detection strategies and deploy alerting to identify malicious activity.


    Security Compliance Analyst

    Your role will be to help our clients understand how to be compliant with all relevant policies and regulations. Each compliance analyst is expected to become a subject matter expert in one of the regulatory frameworks in which we operate and be able to provide insight on those frameworks and their requirements to other members of the team. You will also help design testing strategies, conduct regular reviews of those tests, define compensating controls, work with the business to handle policy exceptions, and identify risks to the risk management team.


    • PCI DSS
    • HIPPA, SOC2
    • NIST CSF, CIS, NIST 800-53, CMMC
    EN