Workshop AllThreats Security Careers
⇄ Switch to ZedTrust | ← Hub

Build Your Career.
Not Someone Else's
Headcount.

Every salary band is published on this page. Every benefit is described in full. The interview process is outlined below before you apply. We don't believe information asymmetry serves anyone well — especially candidates deciding whether to leave a job they know for one they don't.

Salary ranges published upfront
All benefits disclosed before offer
Interview format described below
Feedback to every candidate
5.3 yrs
Median employee tenure
72%
Senior roles filled internally
3–5 days
Response to every applicant
100%
Candidates receive outcome feedback

You'll Know What to
Expect Before You Apply.

Our interview process is the same for every candidate at each level. No surprise rounds, no unpaid take-homes over 2 hours, no 6-week timelines. Here's exactly what happens after you submit.

01

Application Review

Every application is reviewed by a human — not a keyword filter. You'll hear back within 3 business days whether we're moving forward or not. If not, we'll tell you why.

02

Recruiter Call — 30 min

Adriana or a member of her team. We discuss your background, answer your questions, and confirm the role is a genuine mutual fit before either of us invests more time.

03

Hiring Manager Interview — 60 min

A structured conversation with your future manager. Questions are shared 48 hours in advance. For technical roles, a 60-minute practical exercise follows — compensated at $75/hr if you're not hired.

04

Team Meet & Offer

45-minute informal conversation with 2 team members. No additional evaluation — this is for you to assess us. Offer, if extended, comes within 2 business days with 5 days to decide. No exploding deadlines.

On take-home exercises: Any technical assessment over 2 hours is compensated. We will tell you the scope and time estimate before you agree to it. Your work product belongs to you — we don't use candidate work in production. Ever.

Open Roles

SOC Analyst I
Security Operations
Threat Intelligence Analyst
Intelligence
Talent Acquisition Partner
People Operations
Detection Engineer I
Platform & Engineering
💰 $72,000–$90,000 📍 Chicago, IL (Hybrid — 2 days on-site) ⏱ Full-time 🕐 Rotating shifts — compensated
SOC Analyst I — Managed Detection
Security Operations · Reports to Renata Osei, SOC Manager

About the Role

We're looking for someone early in their career who wants to build real detection skills alongside practitioners who've been doing this for years. You'll be working in a managed detection environment, triaging alerts, investigating incidents, and learning detection engineering from people who write the rules — not just apply them. Your hiring manager is Renata Osei, a 7-year AllThreats veteran who was promoted from this exact role.

What You'll Actually Do

  • Monitor and triage security alerts across managed client environments (target: 40–60 alerts per shift, with full support from the team)
  • Investigate escalated alerts with guidance from senior analysts — no solo decision-making on your first month
  • Write incident reports for internal use; client-facing documentation comes after 60 days when you're ready
  • Participate in detection rule review sessions — you'll contribute ideas, not just execute tickets
  • Attend at least one team knowledge share per month; you're expected to bring questions, not just answers
  • Paired mentorship with a senior analyst for your first 6 months — named, scheduled, not optional

What We're Looking For

  • 0–2 years of experience in a security environment — internships, labs, home labs, and student SOC programs count
  • Familiarity with SIEM concepts (you don't need to be a Splunk expert yet — you'll learn on the job)
  • Basic understanding of network protocols and log analysis; curiosity to go deeper
  • Security+ or equivalent knowledge base (certification not required at hire — we'll fund it within 90 days)
  • Ability to communicate clearly under pressure and ask for help when you need it
  • Eligible to work in the US — we do not require a clearance for this role

Shift & Compensation

  • Rotating shifts across a 5-team schedule — you'll know your schedule 4 weeks in advance
  • Night and weekend shifts are compensated with a 15% differential — on top of base salary, not instead of PTO
  • On-call is not required for Analyst I. You'll opt into an on-call rotation after 12 months, with additional pay.
  • Shift swaps are supported and encouraged — we don't penalize people for having lives

Benefits — All Published, No Surprises

💰

Salary: $72,000–$90,000

Based on experience within the band. Band is published. We explain how placement decisions are made.

🏖️

20 Days PTO + 10 Sick Days

Accrues from day one. Unused PTO paid out or carries over. Sick days never count against your vacation.

📚

$4,200 Annual Learning Budget

Your call — certs, conferences, books, labs. Security+ exam and prep fully funded within 90 days of start.

🏥

Health/Dental/Vision — 90% Covered

AllThreats pays 90% of your premium, 75% for dependents. Full plan details in the offer letter — not after.

💼

Day-One 401(k) — 5% Match

No vesting cliff. No 12-month wait. Match begins with your first paycheck. 100% immediately vested.

🏠

$1,500 Home Office Stipend

One-time setup fund, plus $100/month for internet and equipment. For hybrid employees too — not remote-only.

How to Apply

Submit your resume. No cover letter required — we'll ask specific questions in the application form instead of asking you to summarize your resume in prose. You'll hear back within 3 business days. If we're not moving forward, you'll receive a brief note explaining why. We respond to everyone.

Apply for this Role
💰 $90,000–$115,000 📍 Remote (US) or Chicago / Reston ⏱ Full-time 🔍 No clearance required
Threat Intelligence Analyst
Intelligence · Reports to Devon Choi, Sr. TI Analyst (Principal-track)

About the Role

This role sits on the ThreatMap intelligence team producing finished intelligence products for our enterprise client base. You'll work with a named team of analysts, have direct access to clients, and contribute to the detection logic that our MDR clients depend on. Devon Choi leads this team — they've been at AllThreats for 6 years, were promoted twice, and built most of the frameworks you'll be using.

What You'll Actually Do

  • Produce finished intelligence products — threat actor profiles, campaign reports, executive briefs — for 8–12 named clients
  • Monitor collection sources (open, closed, and proprietary via ThreatMap) and synthesize signals into actionable intelligence
  • Map threat actor TTPs to MITRE ATT&CK and collaborate with Detection Engineering on rule development
  • Participate in client briefings — you'll present your own work, not hand it to an account manager
  • Contribute to team methodology documentation; your analysis frameworks become team assets
  • On-call rotation is approximately 1 week per 8-week cycle, fully disclosed and compensated at 1.25x base rate

What We're Looking For

  • 2–3 years of experience in threat intelligence, security analysis, or a related field
  • Demonstrated ability to write finished intelligence products — not just raw analysis
  • Familiarity with MITRE ATT&CK and intelligence tradecraft fundamentals
  • Curiosity about threat actor motivations, not just their tools
  • GREM, GCTI, or equivalent is a genuine plus — not a screen-out if absent
  • No clearance required — cleared candidates welcome but this role does not require access to classified material

Benefits — All Published, No Surprises

💰

Salary: $90,000–$115,000

Band published. Placement based on experience, explained at offer. No anchoring games.

🏖️

20 Days PTO + 10 Sick Days

Accrues day one. Paid out annually if unused. Conference attendance is separate — not taken from PTO.

📚

$4,200 Annual Learning Budget

Plus $500 bonus for each certification passed. DEF CON and Black Hat attendance fully funded.

🏥

Health/Dental/Vision — 90% Covered

$500/month mental health stipend, separate from insurance. Gender-affirming care covered since 2018.

💼

Day-One 401(k) — 5% Match

Immediate vesting. No waiting period. Your first paycheck includes the match.

🎤

Speaking & Research Support

Your research is yours. We fund conference submissions, provide coaching, and your published work stays yours.

How to Apply

Submit your resume and optionally a writing sample (a piece of finished intelligence you've produced — sanitized as needed). You'll hear back within 3 business days. Every candidate receives outcome feedback regardless of decision.

Apply for this Role
💰 $80,000–$100,000 📍 Austin, TX (Hybrid — 2 days on-site) ⏱ Full-time 🤝 Quality-first recruiting model
Talent Acquisition Partner
People Operations · Reports to Adriana Orellana, Sr. TA Partner

About the Role

This role supports recruiting across AllThreats — primarily for technical positions in Security Operations, Threat Intelligence, and Detection Engineering. You'll manage 8–12 open requisitions at a time (not 20–30), with dedicated coordinator support, and your success is measured on quality of hire and candidate experience — not just offer acceptance rate. Adriana Orellana leads this team and has been at AllThreats for 5 years recruiting for roles she'd take herself.

What You'll Actually Do

  • Own full-cycle recruiting for 8–12 open roles — technical screening included, not outsourced to hiring managers
  • Partner with hiring managers to define role requirements before posting, not after candidates are already in process
  • Provide structured feedback to every candidate who reaches a phone screen — form letter feedback is a last resort, not a first response
  • Source proactively using LinkedIn, community events, and referrals — we don't rely entirely on inbound
  • Contribute to structured interview design for your requisitions — you help set the criteria, you don't just schedule
  • Participate in at least one DEI sourcing initiative per quarter — with dedicated time, not as an afterthought

What We're Looking For

  • 2–4 years of full-cycle recruiting experience; cybersecurity or technical recruiting a plus, not a requirement
  • Track record of providing structured candidate feedback — not just offer/decline
  • Comfort managing ambiguity without managing it by just filling roles fast
  • Genuine curiosity about the technical roles you'll be recruiting for — you don't need to be an analyst, but you should want to understand what one does
  • Experience with Greenhouse or similar ATS
  • SHRM-CP or equivalent is a nice-to-have — we'll support you in getting it if not

How We Measure Success

  • Offer acceptance rate and quality-of-hire ratings from hiring managers at 90 days
  • Candidate experience scores (we survey every candidate who reaches a phone screen)
  • Time-to-fill, weighted against requisition complexity — we don't compare a SOC Analyst I to a VP Engineering
  • Diversity of interview slate — we track this and hold it as a success metric, not just a nice-to-have

Benefits — All Published, No Surprises

💰

Salary: $80,000–$100,000

No commission. No quota bonus. Competitive base with annual merit increases.

🏖️

20 Days PTO + 10 Sick Days

Full accrual from day one. We mean it when we say use your PTO.

📚

$4,200 Annual Learning Budget

SHRM certification included. We'll fund your professional development in HR/recruiting.

🏥

Health/Dental/Vision — 90% Covered

$500/month mental health stipend. Parental leave: 16 weeks paid for all parents.

💼

Day-One 401(k) — 5% Match

Immediate vesting. No waiting period.

🏠

$1,500 Home Office Stipend

Plus $100/month ongoing. Applies to hybrid employees, not just remote.

How to Apply

Submit your resume. No cover letter required. We'll ask 3 short-answer questions in the application about your approach to candidate feedback and sourcing strategy — these replace the cover letter. You'll hear back within 3 business days.

Apply for this Role
💰 $95,000–$120,000 📍 Remote (US) or Chicago / Reston / Austin ⏱ Full-time 🛡 No clearance required
Detection Engineer I
Platform & Engineering · Reports to Tariq Mahmood, VP Professional Services

About the Role

Detection Engineering at AllThreats means writing rules that actually matter — tuned to real threat actors, validated against our MDR client environments, and continuously improved based on what our TI team is seeing. You'll own your detection logic end-to-end, contribute to purple team exercises, and have direct access to the threat intelligence that informs your work. This is a practitioner role with real ownership, not a support function.

What You'll Actually Do

  • Develop, test, and maintain detection rules across SIEM and EDR environments for our MDR clients
  • Analyze alert performance data and tune detection logic — you'll own the feedback loop, not just execute tickets
  • Collaborate with the TI team to translate threat actor TTPs into detection coverage — the intel team sits 10 feet away (or on Slack)
  • Participate in quarterly purple team exercises to validate your detection coverage against real attack scenarios
  • Contribute to runbook development and team documentation — you own what you build
  • On-call rotation approximately 1 week per 8-week cycle — compensated at 1.25x base rate, disclosed upfront, not buried

What We're Looking For

  • 1–3 years of experience in detection engineering, SOC analysis, or security research
  • Working knowledge of SIEM query languages (SPL, KQL, or Sigma — we'll teach you the others)
  • Scripting ability in Python or similar — you don't need to be a developer, but you should be comfortable writing automation
  • Familiarity with MITRE ATT&CK and its application to detection logic
  • GCIA or GCFE preferred but not required at hire — we'll fund the certification within your first year
  • Cloud environment exposure (AWS, Azure, or GCP) is useful — deep expertise is not required at this level

Benefits — Full Disclosure

💰

Salary: $95,000–$120,000

vs. ZedTrust's $75K–$95K for the same level with more years required. Gap at midpoint: ~$22,500.

🏖️

20 Days PTO + 10 Sick Days

vs. ZedTrust's 10 days PTO + 6 sick days. Accrual from day one, no wait.

📚

$4,200 Annual Learning Budget

vs. ZedTrust's $1,000. Certifications funded immediately, not "varies by role and tenure."

🏠

$1,500 Home Office Stipend

vs. ZedTrust's $500 one-time. Plus $100/month ongoing for internet and equipment.

💼

Day-One 401(k) — 5% Match

vs. ZedTrust's 3% match with 12-month eligibility wait. Immediate vesting at AllThreats.

🏥

Health — 90% Employer-Paid

Full plan details in the offer letter. $500/month mental health stipend, separate from insurance.

How to Apply

Submit your resume. Optional: link to a detection rule, blog post, or GitHub repo that represents your work — not required, but always appreciated. You'll hear back within 3 business days. All candidates receive feedback on their application outcome.

Apply for this Role