Bring your Deception Engineering skills and build the future  

Who are we? are a cybersecurity deception-technology SaaS that identifies previously undetected data theft/leakage incidents. We are building a solution to the fundamental cybersecurity issues of monitoring and detecting incidents outside your perimeter. We have a live product, a long runway, paying customers, excited investors and supportive partners. We want brilliant engineers to join the team and take us to the next stage and beyond.

What’s the role?

You’ll work within our engineering team to design and build the decoys, traps and wider deceptive assets within our new platform. You’ll liaise with customers to understand their needs, you’ll consume research and create partnerships that hone your knowledge on current adversary techniques. You’ll build proof of concept demonstrators to show viability and potential value of your ideas, and you’ll specify tasks for our engineering team to bring your visions to life. You’ll also help specify the ingest and analysis components, so that our platform can make best use of the signal created by your assets. 

Specific responsibilities include:

  • Undertake research on latest attack vectors, breaches and vulnerabilities
  • Propose new deception assets, new signal creation opportunities and data ingestion methods and analysis
  • Build proof of concept demonstrations to valid hypotheses
  • Specify engineering tasks for delivery

Who are you?

You’ll have enough experience to work largely autonomously (suggestion is 5 years or more) in a role with similar requirements (we recognize there’s not been many deception engineer roles in the market to date, so we’re looking for comparable skills and experience). You’ll have spent time in cybersecurity software companies, ideally in a startup / early stage company. You’ll have a defined skillset that we can lean on with confidence (I’m an expert with Zeek, for example), but be excited to learn new skills.

Qualities and criteria that will make for a stand out candidate include:

  • “Product-side” experience within the cybersecurity industry
  • Strong technical skills with containerisation, virtualisation, Linux, networking and the services presented by various operating systems
  • Expertise in the application of Mitre ATT&CK framework
  • Familiarity with AWS as a hosting platform for software
  • Experience in software development using Go, Python, Bash, Rust
  • Understanding of contemporary TTP’s and attacker motivations
  • Demonstrable experience in the use of security packages and applications to attract, detect and understand adversary behaviour. For example, zeek, wireshark, nmap, p0f, suricata.


  • Competitive Salary (up to £90k depending on experience)
  • Pension plan
  • Options plan
  • Training and development support
  • Remote working
  • F2F quarterly planning sessions somewhere nice


It all starts with an email; please send your cv and a short introductory note to