Norse is the global leader in live attack intelligence, helping organizations preemptively block attacks, detect compromises and track emerging threats.

We’re building something new

We’re looking for builders. People that like to get their hands dirty creating something from scratch. We don’t actually know how many security startups our team members have helped launch, but it’s a lot. RSA, ArcSight, VeriSign, Imperva, Riptech, Solera and Cloudmark are a few you might recognize. We’ve led change initiatives for multinationals. We’ve reinvented whole technologies. And now we’re reinventing security, around Intelligence. Somebody has to: because security–as-usual isn’t working. Join us.

Marketing Events Manager

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Location: Foster City, CA

Description:

The Marketing Events Manager is our go-to guru when it comes to all things social at Norse! The ideal candidate will thrive on managing our presence at major events like RSA Security Conference, BlackHat USA, InfoSecurity America & Europe – while also enjoying coordinating some of our smaller engagements (like private dinners, company events, launch parties & more).

Qualifications:

  • 2 Years (Minimum) Experience In Managing InfoSec, Technology & Corporate Events.
  • Great Track Record in Coordinating, Managing & Producing Successful Events (Large & Small).
  • Marketo; Event Analytics & Lead Nurture Experience.
  • Fun & Social – after all, you are the beating heart of Event Marketing!
  • Sales Force Experience In Coordinating Lead Gen & Lead Flow.

Responsibilities:

  • Manage Contracts, Logistics & Budget for all Marketing & Sales Events.
  • Work Closely with the Product & Sales Team To Ensure The Success of Product Launches, Private Dinners, CISO Roundtables, Corporate Events and Trade Shows.
  • Manage Marketing Inventory & Help Us Build Up Our Closet Of Cool Norse Gear!
  • Help Organize, Manage & Drive Attendance To Marketing Webinars & Online Events.
  • Manage Online Event Advertising (Landing Pages, Web Banner Advertising, etc.).
  • Hire, Train & Manage Internal & External Event Staff.
  • Ensure Staff Is Adequately Trained For Events.
  • Plan Menu’s, Order Food & Hire Catering Services As Needed.
  • Evangelize The Norse Brand Through Social Media (Twitter, LinkedIn, FaceBook) and Help Promote Our Public Appearances.
  • Ensure All Marketing Materials (Data Sheets, White Papers, Corporate Overview, Etc) are Updated and Current at All Pubic Events as Well as On Our Corporate Website.
  • Plan & Facilitate Company Team Building Events.
  • Other duties as needed.

Required Skills:

  • Passion for events, marketing & brand evangelism.
  • Experience working on an innovative, quality-focused and fast-paced in-house team.
  • Team attitude.
  • Strong Independent & Interdependent Work Ethic.
  • Experience in the cybersecurity industry is preferred, but experience in the technology sector is a must.
  • Ability to Work At Our Foster City Office Location.
  • Ability to Travel In & Out of the United States.
  • Experience With International Event Production.
  • The mindset of performing a strategic function at Norse and not an order processor.

EMAIL CAREERS@NORSECORP.COM TO APPLY.

UI Engineer

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Location: Foster City, CA

Description:

The UI Engineer will be part of the Product Engineering team. They will be responsible for interpreting wireframes and flows into beautiful, working UI code and components for our products. The two main duties of the role are:

  1. Build the HTML, CSS and javascript needed to implement the UI design into the working product. Work tightly with the design team to solve design and interaction issues as they come up.
  2. Architecting reusable code and components for a multi product environment. This includes assessing frameworks, code libraries, plugins, style sheet compiling tools, debugging tools, etc. Really great work has the potential to be reused company-wide.

Responsibilities:

  • Making yourself aware of existing UI conventions and patterns
  • Tight collaboration with UX Designer on implementing the interactions and flows
  • Identifying opportunities for reusable components and architecting them accordingly
  • Being responsible for the final work product, including auditing of the production implementation to make sure it adheres to the intended design and guiding Software Engineering to solve issues and edge cases.

Required Skills:

  • 3+ years front-end development experience
  • Clean, maintainable, and semantically correct HTML/CSS, including HTML5/CSS3
  • In-depth knowledge of the capabilities of all modern browsers
  • Experience with Angular.js andD3 graphs
  • Knowledge of jQuery, Javascript, XML, JSON, AJAX
  • Expert with CSS preprocessors (Sass), frameworks, and development/debugging tools
  • Working knowledge of web accessibility guidelines, data object and page optimization
  • Impeccable implementation – triple check for mistakes, and fix them immediately

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Senior Technical Support Engineer

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Location: Foster City, CA

Overview:

We are seeking a qualified, motivated, and experienced technical support engineer with excellent customer skills and technical depth to interface with engineering to resolve user issues. We are an extremely fast-paced, security-driven company.

Description:

A ground-floor opportunity for a Technical Support Engineer. L2/L3 trouble-shooting of security cloud product in the Internet threat intelligence space. Work closely with engineering, sales engineering, and customers to troubleshoot both POCs and production problems.

Qualifications:

  • 4+ years experience.
  • Unix and Windows command line.
  • Configuring routing on network.
  • Scripting (shell, perl, etc).
  • FreeBSD expertise.
  • FAMP web Stack.
  • APIs for the web including HTTP, XML, JSON and XML RPC.
  • Troubleshooting, installing, and configuring, OSS including LAMP and CMSs.
  • Experience at enterprise security vendor or hands-on with security products desired.

Preferred Skills:

  • Team lead experience.
  • Coding/scripting experience of any kind.

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Intelligence Analyst

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Location: Foster City, CA

Overview:

Norse is recruiting intelligence analysts to work on a team to bring analysis and operations together to maximize the impact of resources against organizations and key individuals who pose a threat to cyber security.

Description:

Analysts will be asked to use unique datasets, specialized tools, and network analysis techniques to identify and analyze threats. Analysts identify opportunities to disrupt them, and evaluate the risks and benefits of proposed operations.Analysts regularly produce a range of sophisticated short and longer-term analytic targeting intelligence products and provide close analytic support to operations for US policymakers, NATO Allies, military officials, and law enforcement agencies as well as the business environment.Analysts focus on regions of the world and on functional topics including cyber threats, terrorism, narcotics trafficking, counterintelligence, and corporate espionage.

Qualifications:

  • Schoolhouse trained.
  • All-Source Analyst, SIGINT Analyst, CI Agent, HUMINT Collector, or Imagery Analyst.
  • Real world experience in the field.
  • In lieu of a schoolhouse trained analyst; minimum requirements include a bachelor’s degree in foreign area study, international relations, political science, national security studies, or Geography.
  • Strong academic credentials in network analysis, stateless organizations, or intelligence analysis are a plus.
  • Familiarity with the intelligence communities reporting methods, ISR assets, Targeting, and GIS familiarity are required.
  • All applicants must successfully complete a thorough psychological exam, a polygraph interview and an extensive background investigation.
  • US citizenship is required.

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Information Security Analyst

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Location: Foster City, CA

Overview:

Norse is seeking a qualified, motivated, and experienced Information Security Analyst with technical expertise and data analytics experience. We are an extremely fast-paced, security-driven company that requires coordination of team efforts to thrive. We provide unparalleled insight into suspect and malicious activity, as well as intelligence on the miscreants behind that activity, for fellow Information Security and IT professionals to use in mitigating threats to their networks and systems.

Description:

An experienced opportunity for an information security analyst familiar with analyzing massive amounts of data and applying mathematical, statistical, and other analytical tools in combination with a deep understanding of the discipline of information security in order to provide context for stakeholders and the community at large. The individual filling this will be reviewing our data looking for malicious actors, generating reports on such activity for consumption by staff, our customers, third parties, and the information security community as a whole. Such reporting will be technical in nature, digestible by C-level executives (such as Chief Information Security Officers (CISOs)), as well as technical information security and information technology practitioners. In addition, this role will provide recommendations and suggestions to enhance Norse’s powerful live attack and advanced threat intelligence capabilities.

Required Skills:

  • Monitor, evaluating and interpreting: vulnerabilities/CVEs, mitigation measures and compensating controls, vulnerability assessments, system/device/IDS/IPS logs, threat analysis, malware, open and closed source reporting.
  • Understanding and in-depth knowledge regarding the administration, use, securing and exploiting common operating systems.
  • Understanding and in-depth knowledge regarding the administration, use, securing and exploiting common consumer and enterprise devices.
  • Thorough understanding of computer networking, routing and protocols.
  • Understanding of information security architecture; mitigations of threats and compensating controls.
  • Demonstrated experience and proven methods for performing information security incident management lifecycle, to include response and mitigations.
  • Experience with application of open- and closed-source information resources within the industry.
  • Demonstrated excellent communications skills, both oral and written, for working with a diverse, professional clientele with varying skill levels and technical experience/competency. Ability to interact with customers and staff in person and via written communications. Ability to research highly technical topics, pull together various sources into one concise technical document and put the research into process and procedural documentation and explain technical details clearly and concisely.
  • Willingness and desire to learn. Possess and nurture a hacker mentality, being able to visualize issues and possible solutions ‘outside the box.’ Must be a punctual, professional and devoted member of our team; with the ability to safeguard sensitive, restricted and other information deemed to have special handling and dissemination protocols.
  • High level of ethics and core values.

Preferred Skills:

  • Start-Up Experience.
  • Demonstrated experience and proven methods for performing analysis and interpretation of information from Security Operations Center (SOC) and/or Computer Security Incident Response Team (CSIRT) systems.
  • Understanding of digital forensics procedures and tools, malware analysis and reverse engineering
  • Fundamental understanding of statistics, mathematics and its application to the science of data analysis.
  • Certifications are great, if you have the practical experience to back them up. Having or aspiring to obtain SANS certifications such as GIAC Certified Incident Handler (GCIH) and/or GCIA: GIAC Certified Intrusion Analyst would be looked upon favorably. More importantly is being able to articulate and demonstrate skills, with the ability to obtain certification.

Educational / Certifications and Other Requirements:

  • Bachelor’s degree, a combination of experience and/or Associates degree, or an equivalent combination of education and work experience. Degree must be from an accredited institution, prefer degree be in a technical discipline or majority of coursework in Information Security or Information Technology.
  • Minimum of five (5) years of Information Technology and/or Information Security experience. Minimum of 3+ (three plus) years of related experience in the field of Information Security, to include monitoring and detection, intrusion analysis, threat and/or vulnerability analysis

We offer a competitive salary and benefits. This is a full-time, exempt position reporting to the director of DarkWolf Labs. The responsibilities and duties described here are intended to provide typical examples of the role and are not comprehensive.

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Sr. PHP Developer

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Location: Foster City, CA

Description:

Develop and maintain web sites for specific security missions. Be a web development spy. Create web frameworks with hidden agendas for data collection.

Qualifications:

  • Wide range of web development techniques.
  • PHP expert.
  • SQL.
  • Javascript.
  • PHP framework development.

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Sr. Javascript Developer

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Location: Foster City, CA

Description:

Apply an excellent understanding of javascript and how it can be exploited to recognize such attempts. Script crawlers for research, data collection and discovery of the most malicious aspects of the Internet.

Qualifications:

  • Javascript expert.
  • Javascript framework development.
  • SQL.
  • Web Security.
  • Bonus: Crawler Development.

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Database Developer

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Location: Foster City, CA

Description:

Create new data applications and jobs. Make strategic decisions on data retention and scaling. Create, monitor and tune ETL jobs to best meet the company objectives to provide the best Threat Intelligence with the resources available.

Qualifications:

  • SQL query expert.
  • SQL Schema expert.
  • ETL expert.
  • Data retention and pruning.
  • SQL tuning and maintenance.

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Machine Learning/Data Mining Developer

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Location: Foster City, CA

Description:

Norse is seeking a Machine Learning/Data Mining developer to be part of our Security Engineering team. Determine and extract the most valuable data for detecting malicious activity across multiple threat vectors. Use machine-learning techniques to train classifiers and methods to keep them tuned. Create and monitor processes that apply classifiers to detect malicious activity and protect customers.

Required Skills:

  • Data Mining, R language, Weka, SQL, Scripting
  • Bonus: Network Security

Preferred Skills:

  • Start-Up Experience.

Educational / Certifications and Other Requirements:

  • Bachelor’s degree, a combination of experience and/or Associates degree, or an equivalent combination of education and work experience.

We offer a competitive salary and benefits. This is a full-time, exempt position reporting to the Sr Director of Engineering. The responsibilities and duties described here are intended to provide typical examples of the role and are not comprehensive.

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Intermediate/Senior/Master Malware Analyst & Reverse Engineer

EMAIL CAREERS@NORSECORP.COM TO APPLY.

Location: Foster City, CA

Overview:

Norse is seeking a qualified, motivated, and experienced malware analyst / reverse engineer with technical expertise and research experience. We are an extremely fast-paced, security-driven company that requires coordination of team efforts to thrive. We provide unparalleled insight into suspect and malicious activity as well as intelligence on the miscreants behind that activity. This insight is for fellow Information Security and IT professionals to use in mitigating threats to their networks and systems, as well as our own.

Description:

An opportunity for an experienced malware analyst / reverse engineer familiar with examining malicious software to understand the nature of and how to mitigate the threat on all endpoint devices (servers, appliances, mobile, and desktop systems) with the environment a startup provides. The individual filling this role will conduct both dynamic and static analyses of suspicious code, classify the malware into families, and determine the actors behind them.From this analysis, they will establish signatures that indicate its presence and how such code spreads through systems while also contributing efforts to developing tools and procedures to detect the malicious code. Taking the malicious software and analysis, determining possible mitigations and compensating controls, reviewing the Norse threat intelligence platform for correlating activity, and then generating reports on that activity for consumption by staff, our customers, third parties, and the information security community as a whole. Such reporting will be technical in nature, digestible by C-level executives (such as Chief Information Security Officers), as well as technical information security and information technology practitioners. In addition, this role will provide recommendations and suggestions to enhance Norse’s powerful live attack and advanced threat intelligence capabilities.

Required Skills:

  • Examine, identify, classify, and understand the nature of malicious code such as viruses, worms, bots, rootkits, and Trojan horses and how they impact servers, appliances, desktop systems, and mobile devices. Have intimate knowledge of three phases of malware analysis (Behavioral analysis, code analysis, and memory analysis)
  • Experience with interpreted and compiled programming languages; and must possess a keen understanding of software development/Software Development Life Cycle (SDLC)
  • Extensive knowledge of high level programming languages such as C/C++, Python, Assembly, as well as various scripting languages.
  • Experience with signature development along with writing exploit code
  • Understanding and in-depth knowledge regarding malware analysis and reverse engineering, including extensive experience using common tools such as:
    • Dissasemblers (such as IDA Pro)
    • Debuggers (such as OllyDbg and WinDbg)
    • System Monitor (such as Process Monitor, RegShot, and Process Explorer)
    • Network Monitor (such as TCP View, TCP Dump, and Wireshark)
    • Packer Identifier (such as PEID)
    • Unpacking Tools (such as Qunpack and GUNPacker)
    • Binary Analysis Tools (such as PE Explorer and Malcode Analysts Pack)
    • Code Analysis Tools  (such as LordPE, ImpRec,BinDiff)
  • Understanding and in-depth knowledge regarding the administration, use, securing and exploiting common operating systems
  • Understanding and in-depth knowledge regarding the administration, use, securing and exploiting common consumer and enterprise devices.
  • Understanding of computer networking, routing and protocols
  • Demonstrated excellent communications skills, both oral and written for working with a diverse, professional clientele with varying skill levels and technical experience/competency. Ability to interact with customers and staff in person and via written communications. Ability to research highly technical topics, pull together various sources into one concise technical document and put the research into process and procedural documentation and explain technical details clearly and concisely
  • Willingness and desire to learn. Possess and nurture a hacker mentality, being able to visualize issues and possible solutions ‘outside the box.’ Must be a punctual, professional and devoted member of our team with the ability to safeguard sensitive, restricted and other information deemed to have special handling and dissemination protocols.
  • High level of ethics and core values

Preferred Skills:

  • Start-Up Experience
  • Demonstrated experience and proven methods for performing analysis and interpretation of information from Security Operations Center (SOC) and/or Computer Security Incident Response Team (CSIRT) systems
  • Understanding of digital forensics procedures and tools
  • Understanding of information security architecture; mitigations of threats and compensating controls
  • Demonstrated experience and proven methods for performing information security incident management life-cycle, to include response and mitigations
  • Fundamental understanding of statistics, mathematics and its application to the science of data analysis
  • Experience with application of open- and closed-source information resources within the industry
  • Certifications are great, if you have the practical experience to back them up. Having or aspiring to obtain SANS certifications such as the following would be looked upon favorably. More importantly is being able to articulate and demonstrate skills, with the ability to obtain certification
    • GXPN: GIAC Exploit Researcher and Advanced Penetration Tester
    • GREM: GIAC Reverse Engineering Malware

Educational / Certifications and Other Requirements:

  • Bachelor’s degree, a combination of experience and/or Associates degree, or an equivalent combination of education and work experience. Degree must be from an accredited institution, prefer degree be in a technical discipline or majority of coursework in Information Security or Information Technology
  • Minimum of five (5) years of Information Technology and/or Information Security experience. Minimum of 5+ (five plus) years of related experience in the field of Information Security, to include malware analyst / reverse engineer, monitoring and detection, intrusion analysis, threat and/or vulnerability analysis

We offer a competitive salary and benefits. This is a full-time, exempt position located in San Mateo, California reporting to the director of DarkWolf Labs. The responsibilities and duties described here are intended to provide typical examples of the role and are not comprehensive.

EMAIL CAREERS@NORSECORP.COM TO APPLY.