What we believe in

Securelayer7 career protocol

What to expect from Application Process?

First Round

Screening Call

  • The purpose of this call is to determine whether you have the skills and experience that we are looking for.
  • This will normally comprise a number of short technical questions.
  • For the security consultant role, the call will focus on relevant experience, achievements, certifications, basic details etc.
  • The call takes around 10-20 minutes.

Second Round

CTF Round

  • Once the screening round is done, we push towards the CTF round.
  • CTF credentials will be shared via email on your mentioned email ID.
  • CTF portals consist of multiple challenges under various domains like Web, Network, Crypto, Forensic etc.
  • CTF credentials will come with a certain timeline.
  • Once you complete with the assignment, you need to share detailed report to us.
  • CTF report will be forwarded to our technical team for reviewing.

Third Round

Technical Call 1

  • Technical call with a Security Consultant Manager or Team-lead:
  • For interns it would be a video conference call with the Manager or Team-lead. (The call takes approximately 1-1.5 hour)
  • For experienced candidates, it would be an one-on-one call with the Manager or Team-lead. (The call takes approximately 50-60 min)
  • The Candidate will be shortlisted as per their knowledge and skill set.
  • The call will focus on knowledge under different domains or areas or platforms.

Fourth Round

Technical Call 2

  • Technical one-on-one call with the Manager. (the call takes approximately 50-60 min)
  • Call will focus on scenario-based questions or logical understanding followed with some technical questions.
  • Technical team can also arrange some live demo sites to understand knowledge of pentesting. (depending upon the technical observation)

Fifth Round

HR Round

  • The call aims on compensation discussion, behavioural analysis, cultural fitment, stability assessment, salary negotiation, etc.
  • This is much of a call to get to know one another even more.

Fortify Career’s Infrastructure

Casual Dress Code

Get comprehensive insights from a tried and tested hybrid testing process

Best Caffeine

A huge variety of hot drinks to choose from.

Hack Days Tech

Learn, Hack, become better security expert.

Flexible Hours

We value results, not face time.

Competitive Salaries

We strive to pay top of market compensation.

Security Conferences

Our Security consultants speak at multiple security conferences around the globe and we help them to reach there.

Current Openings

Associate Cybersecurity Consultant

As an Associate Cybersecurity Consultant, you will play a pivotal role in conducting various vulnerability assessment

Client Site
Full Time
Senior Penetration Testing

As a Senior Penetration tester you will be assigned mission to pentest Web, Binary (RE), Mobiles apps, Source code audit, application architecture review, Cloud infrastructure (AWS, GCP, Azure), & Ethereum Smart contract audit. You will be mentoring a JUNIOR Security consultant.

Remote
Full Time
Technical Project Manager

A Cybersecurity project manager with 5+ years of relevant experience will be responsible for delivering the cybersecurity services projects.

Onsite
Full Time
Technical Project Manager

A Cybersecurity project manager with 5+ years of relevant experience will be responsible for delivering the cybersecurity services projects.

Onsite
Full Time
Associate Cybersecurity Consultant

As an Associate Cybersecurity Consultant, you will play a pivotal role in conducting various vulnerability assessment

Client Site
Full Time
Senior Penetration Testing

As a Senior Penetration tester you will be assigned mission to pentest Web, Binary (RE), Mobiles apps, Source code audit, application architecture review, Cloud infrastructure (AWS, GCP, Azure), & Ethereum Smart contract audit. You will be mentoring a JUNIOR Security consultant.

Remote
Full Time

Can’t find what you’re looking for?

Drop us an mail, tell us why you want to work with us, and we’ll reach out to you shortly.

Catch the latest security insights