Name (a to z)
Name (z to a)
1Password remembers your passwords for you — and helps you make them stronger. All your secrets are secure and always available, safe behind the one password that only you know Embrace the unconventional. We all work best in different ways. At 1Password, you can choose the location, environment, schedule, and approach that works best for you, and are encouraged to take time to recharge. Hands on.
Aptible was founded to build trust on the internet. We do this by making it easier for companies to go from having an idea to releasing it to the world safely and securely. Protecting data online can no longer be an afterthought. Saying “we take data security seriously” isn’t good enough. Customers, partners, investors, shareholders, and vendors are all demanding proof that you’re authentically investing in data security.
The Sonatype journey started 10 years ago, just as the concept of “open source” software development was gaining steam. From our humble beginning as core contributors to Apache Maven to supporting the world’s largest repository of open source components (Central) to distributing the world's most popular repository manager (Nexus), we’ve played a meaningful role in helping the world embrace the power of open innovation.
Socure provides a real-time predictive analytics platform that combines the newest forms of machine learning and artificial intelligence with digital, offline and social identity data to deliver the most accurate and robust KYC, identity verification and fraud risk prediction solution in the market. Socure deploys its advanced identity verification robot across email, phone, online/social, address, IP, physical documents and traditional offline proprietary predictors to help clients better assess identity risk and substantially increase acceptance, reduce fraud losses, and optimize manual review/step up authentication for transactions and applications in the digital world.
Level is a creative software company using the latest technologies to create products that solve problems for IT organizations. We are problem solvers, translating our research and knowledge into creative action. We saw a problem. We created a solution. Level was designed by a team of developers, engineers, and IT professionals who recognized the common issues plaguing remote platforms and grew frustrated with their lack of resolution.
Elastic (NYSE: ESTC) is a search company. As the creators of the Elastic Stack (Elasticsearch, Kibana, Beats, and Logstash), Elastic builds self-managed and SaaS offerings that make data usable in real-time and at scale for use cases like application search, site search, enterprise search, logging, APM, metrics, security, business analytics, and many more. Thousands of organizations worldwide, including Cisco, eBay, Goldman Sachs, Microsoft, The Mayo Clinic, NASA, The New York Times, Wikipedia, and Verizon, use Elastic to power mission-critical systems.
Venafi is the cybersecurity market leader and inventor of machine identity protection, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, code signing, mobile and SSH. Venafi provides global visibility of machine identities and their associated risks for the extended enterprise—on-premises, mobile, virtual, cloud and IoT—at machine speed and scale.
At Corellium, we're building software for virtual devices with real-world accuracy, designed to eliminate barriers to mobile application testing, streaming, etc. Our goal is to ensure developers and engineers are well-equipped to research, work and test on Arm-based technologies in an array of fields, such as Security Research, Mobile App Security Testing, App Testing and IoT Device Security.
Codenotary is the leading company for secure software supply chain. We bring trust and integrity into the software life cycle by providing end-to-end cryptographically verifiable tracking and provenance for all artifacts, actions, and dependencies. We provide the only immutable and client-verifiable solutions capable of processing millions of transactions a second, based on our immudb, the open source standard for immutable databases.
IT Security That Works. Thycotic Software, Ltd. is committed to providing secure password management solutions. From managing privileged accounts to Active Directory self‐service resets, our software securely manages all credentials critical to your company's operations. SECRET SERVER, our password management software, allows teams to control access to all critical passwords in a one central, web‐based repository.
We've offered holistic website security solutions since 2008 including malware removal, malware monitoring, and website protection services. Our SiteCheck website security monitor is used by thousands of website owners every month to monitor their websites for malware, blacklist status, and other security issues, and our CloudProxy Firewall safeguards sites and those who visit them from attacks of all kinds.
We're Fuzzbuzz and we're building a fuzzing as a service platform that integrates into CI systems and the modern software testing workflow. Fuzzing is a type of automated testing that generates and runs thousands of inputs per second on your code to try and find bugs and vulnerabilities. It uses code coverage and other signals from your code to guide the tests it generates and runs. You can read more here.
A new way to enable your organization to provide security assurance. episki focuses on combining growing companies' security programs, regulatory and compliance needs, and assessment activity all under one source, so they have a central place of truth. People know what needs to be done, they know where the artifacts are, and it's clear where things stand, and everyone's accountable.
Tenable®, Inc. is the Cyber Exposure company. Over 30,000 organizations around the globe rely on Tenable to understand and reduce cyber risk. As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver the world’s first platform to see and secure any digital asset on any computing platform. Tenable customers include more than 50 percent of the Fortune 500, more than 30 percent of the Global 2000, and large government agencies.
Surevine builds secure, scalable collaboration solutions for the most security-conscious organizations; joining people up and enabling collaboration on their most sensitive information. Our systems are accredited to handle the most sensitive information, whilst still delivering an intuitive and engaging user experience that actively promotes participation; building smart, secure networks of connected people.
Doyensec is an independent security research and development company focused on vulnerability discovery and remediation. We work at the intersection of software development and offensive engineering to help companies craft secure code. We discover vulnerabilities others cannot and help mitigate risk by providing actionable solutions. In other words, we're an offensive security firm working with the frame of reference of a blue team.
Cohesive Networks provides cloud-class security and networking software for enterprises. VNS3 has recently been named a finalist in the Data Cloud Awards for Best Use of Cloud in Major Enterprise. With over 3,000 connected customers in more than 22 countries, Cohesive Networks has provided more than 500 million hours of application network security. VNS3 offers more dynamic network controls on top of cloud offerings, including multiple VLAN peering, end-to-end data encryption, application-layer firewall rules, multicast, and multi-region peering.
NuCypher is a security and encryption platform for distributed systems, including blockchain, big data, cloud, and internet of things. Our core technology, proxy re-encryption is a type of public-key encryption that allows a proxy entity to transform ciphertexts from one public key to another, without learning anything about the underlying message. It is a means of securely delegating access to encrypted information, via the construction of cryptographically-enforced access controls.
We were founded with the mission of creating a world free from the burden of trust. The cost to the global economy of managing human trust can be measured in the trillions of dollars per year. A whole range of industries (audit, compliance, cybersecurity, inspection, certification) exist that try to narrow the uncertainty associated with trusting others. However, they fail, with rising costs.
The latest jobs in your inbox
We'll keep you updated with the best new remote jobs.