Our core values

We make brave decisions in various situations. Brave decisions are made after evaluating the problem along with taking risks.

We care for each other in our interactions and create a safe environment.

We work and behave honestly, even to our detriment. We believe that honesty creates trust.

We challenge the status quo and seek to discover and test new ideas. Creating new solutions is our value.

We are committed to privacy and confidentiality for each other and our customers.

We value being on the same path and team growth because this leads to individual development, and we know that organizational growth and individual growth are intertwined.

We make decisions quickly and adapt to internal and external changes in any situation so we don't get challenged.

You are precious to us

Flexible working hours

Friendly environment

Free lunch

Educational grant

Wellness programs

Supplemental Insurance

Join us to build a safer world together

Responsibilities
  • Reviewing security reports generated by analysts
  • Working in the incident response team
  • Working as a threat hunter
  • Interaction with technical experts and managers
Requirements and skills
  • Proficiency in various techniques of APT groups
  • Proficiency in all kinds of logs based on host and network
  • Appropriate experience working with incident response and forensics tools
  • Familiarity with the process of static and dynamic malware analysis
  • Familiarity with scripting (Python, Bash, and PowerShell)
  • Work experience in security operation center management and leadership
  • Ability to properly document
  • Ability to interact with technical and management teams
Responsibilities
  • Examining the structure of executive and operational systems based on the OWASP and ASVS framework and verifying the implemented items based on the reference framework
  • Preparing recognition and evaluation reports for each executive and operational system
Requirements and skills
  • Proficient in the latest version of the OWASP Web Security Testing Guide
  • Familiarity with OWASP Application Security Verification Standard
  • Proficiency in CSS, HTML, and JavaScript
  • Proficient in one of the scripting languages (PHP, Python, etc.)
  • Familiar with the basic concepts of network and communication
  • Proficient in using vulnerability scanning tools and checking vulnerabilities on systems or software programs.
  • Familiar with reviewing and analyzing security information technology architecture and design documents
  • Adequate knowledge of information security management systems and ISO/IEC 27001 standard
  • Ability to read and understand English texts
Responsibilities
  • Implement new user-facing features with a focus on accessibility and user experience
  • Develop reusable, optimized, and tested modules and components
  • Write clean, reliable, and maintainable code
  • Proactively collaborate and assist team members
  • Attention to detail with a good sense of design
Requirements and skills
  • Strong problem-solving skills and an analytical mindset
  • Deep understanding of web markup, including HTML, CSS
  • Thorough knowledge of client-side scripting and JavaScript frameworks, including React
  • Experienced in software testing, including unit testing and E2E testing
  • Good understanding of asynchronous request handling, caching, and server state management
  • Sufficient in writing Typescript code
  • Good knowledge of GraphQL APIs
  • Understanding the fundamentals of Git
Responsibilities
  • Product support and testing
  • Software installation for customers
  • Software training for customers
  • Responding to customer queries in a timely and accurate way
  • Evaluation and classification of problems reported by customers
  • Informing customers about the situation of their problems
  • Appropriate expression technique to answer
  • Reporting
  • Effective communication with the technical team
Requirements and skills
  • Being responsible
  • Being disciplined and accurate
  • Has good public relations and teamwork spirit
  • Ability to understand and solve problems
  • Sufficient knowledge of customer support and its challenges
  • Being patient and having a high persuasion ability
  • Familiarity with Linux and Container
  • Familiarity with computer networks
Responsibilities
  • Development of security policies
  • Holding meetings and interacting with different technical groups
  • Providing technical solutions for securing the infrastructure, operating systems, and services
  • Reviewing the generated security reports
Requirements and skills
  • Familiarity with network, Windows, and Linux
  • Familiarity with the configuration of various network equipment and network security such as WAF, UTM, and firewall
  • Familiarity with cybersecurity frameworks such as CIS and NIST
  • Familiarity with SOC
  • Having high public relations and the ability to interact with technical and management teams
  • Work experience in network and security management
Responsibilities
  • Setting up and management of various SOC tools
  • Examining new technologies in SOC
Requirements and skills
  • Having adequate experience in setting up various SOC tools
  • Proficiency in SOC processes
  • Proficiency in Splunk or Elastic-Stack (launch and management)
  • Proficiency in scripting (Bash, PowerShell, and Python) SOC event analysis specialist
Responsibilities
  • SIEM event monitoring and analysisSIEM event monitoring and analysis
Requirements and skills
  • Familiarity with the structure of Windows and Linux operating systems
  • Familiarity with network and web concepts
  • Familiarity with the concepts of cyberattacks in different layers
  • Familiarity with the structure of SIEM and the ability to work with at least one of the widely used SIEMs
  • Ability to analyze all kinds of system and network logs
  • Familiarity with scripting (Bash, PowerShell, and Python)
Responsibilities
  • Malware analysis
  • Forensic
  • Threat hunting
  • SIEM use case development
Requirements and skills
  • Proficiency in various APT group techniques
  • Adequate experience working with incident response and forensics tools
  • Familiarity with the process of static and dynamic malware analysis
  • Familiarity with scripting (Bash, PowerShell, and Python)