Your Application

Submit your application carefully. Not all submissions will be accepted for the selection process. Explain clearly why you are applying, what skills you bring, and why we should choose you.

What you should can

We are looking for candidates with strong skills in reverse engineering, offensive cybersecurity, vulnerability research, and bug bounty hunting. Experience with network analysis, exploit development, and secure coding practices is highly valued. Candidates must be precise, analytical, and able to work independently on complex technical challenges.

black flat screen computer monitor
black flat screen computer monitor

496+

15

Currently Available Positions

Applications

woman wearing yellow long-sleeved dress under white clouds and blue sky during daytime

Contact for applications only