Our company is built around exceptional people. We come from many different backgrounds: cybersecurity operators, national security experts, senior policy makers, intelligence analysts, corporate developers, banking specialists, SEC litigators, and more. We each bring something different to the table, and we all love finding a new way to stop the bad guys.
“There is the unrestricted liberty here to research, introduce new ideas, and implement something good. Most importantly, the ability to dive deep and discover new ways to counteract malicious approaches. With no restrictions, people who get to do what they like to do are like hungry sharks. We're unshackled.”Ryan, Operations Technologist
We are experts in our fields with a proven track record of defending the most critical, at risk networks in the world. Our company reflects the cumulative experience of us all, and we prioritize not only personal growth, but growth as a team through time spent together; we climb rocks, enjoy local happy hours—though not at the same time—and more.
A Great Place to Work
Although we strive to make our time in the office as rewarding as possible, we recognize the importance of time away from work. We value work-life balance, time with our families, and the pursuit of fulfilling hobbies. In addition to unlimited nitro cold-brew coffee on tap and complimentary Nerf darts, we provide a full suite of benefits including medical, dental, vision, 401(k), life insurance, and disability coverage:
- All at no cost to our employees
- With limited cost to add dependent coverage
- And coverage begins the first day of employment
Choose Your Adventure
An Emerging Threats Analyst at Trinity Cyber is responsible for digging deep into the world of open source and proprietary threat intelligence. Most of your time will be spent researching and countering some of the latest threats in cyberspace, on behalf of clients of Trinity Cyber, by developing creative and unique Formulas for direct deployment into our exclusive Proactive Threat Interference® technology. We hire the best bloodhounds at Trinity Cyber.
An Emerging Threats Analyst at Trinity Cyber is responsible for digging deep into the world of open source and proprietary threat intelligence. Your responsibilities will be to utilize and help maintain both open source and commercial malware triage systems and to analyze malware samples to produce valuable threat intelligence information. We hire the best bloodhounds at Trinity Cyber.
Looking for a candidate to build and lead a team of malware analysts who focus on static, dynamic, and reverse engineering of malicious binaries and documents. Requires the ability to perform advanced analysis on malware samples to extract network information, metadata, and signature content. You will be responsible for a highly developed pack of the best cyber security bloodhounds.
Our Operations Threat Analyst are responsible for digging deep into the world of open source and proprietary threat intelligence as part of a 24/7 dynamic team. You will be responsible for monitoring and assessing the effectiveness of all analytics, signatures, and heuristics which integrate into Trinity Cyber’s exclusive technology, as well as communicating and documenting such findings within a team environment. We hire the best bloodhounds at Trinity Cyber.
An Operations Technologist at Trinity Cyber is responsible for digging deep into the world of our exclusive technology as part of a 24/7 dynamic team. You will be responsible for monitoring and troubleshooting the health and status of Trinity Cyber’s exclusive technology, as well as communicating and documenting such findings within a team environment. We hire the best bloodhounds at Trinity Cyber.
Trinity Cyber is looking for software engineers to join their engineering team to help build out a highly customized x86 Linux based network security system. Ideal candidates will be able to work with the network analysis and operations teams to generate feature requests, design a conceptual software architecture, and implement that architecture. The software you develop will be “mission critical” and running 24x7 with SLAs in place depending on it operating correctly.”
Trinity Cyber is looking for a software developer who loves writing code to build a FOSS private cloud. This individual will be responsible for all activities related to this private cloud infrastructure. You will join a growing team of primarily programmers who are focused on infrastructure and understand the systems they are working with at a deep level. This role requires creativity, tenacity, an eye for detail, curiosity and a deep desire to learn and truly understand new technologies.
Trinity Cyber is looking for a talented software developer to join our Engineering team. You’ll be responsible for creating the applications we use to manage our networks, develop threat countermeasures, and make sense of the all the data we generate. This includes integrating backend systems, designing APIs, and deploying code in a production environment. We’re looking for somebody that is passionate about technology and who has an uncanny ability to make complicated things look simple.
Trinity Cyber is looking for a web developer to help build internal and client-facing web applications to support data analysis, cyber security operations, and secure communicaton. Ideal candidates will be able to analyze business and operational requirements and work with other members of the engineering team to design, develop, test, and deploy web-based solutions.
We’re looking for a talented Technical Writer to help support a dynamic and ever-changing set of documentation and technical writing/editing tasks. You will support multiple technical teams to include Analysis, Engineering, and Operations. Ideal candidates will be comfortable in translating deeply technical subjects into effective communications and have experience writing technical blogs.
The Manager of Internal Security at Trinity Cyber is responsible for digging into the vast amount of data produced within our networks and making action plans based on the analysis of that data. You will work alongside a team of motivated developers, threat analysts, and vigilant operations staff to recommend and implement meaningful internal security measures — from both a technical and policy perspective.