Careers with Norse

Norse is looking for elite people that want to help change the way organizations secure their business. We're a fast growing, fast-paced, results-oriented start up that provides the opportunity for you to make a difference. Our cyber intelligence platform is the most accurate and up to date on the market, and we're building innovative solutions to take advantage of it. Think Norse is right for you? Email a PDF of your resume to: careers@norse-corp.com.

Database Developer

Location: San Mateo, CA

Role:

Create new data applications and jobs. Make strategic decisions on data retention and scaling. Create, monitor and tune ETL jobs to best meet the company objectives to provide the best Threat Intelligence with the resources available.

Qualifications:

  • SQL query expert.
  • SQL Schema expert.
  • ETL expert.
  • Data retention and pruning.
  • SQL tuning and maintenance.

back to top

Sr. Javascript Developer

Location: San Mateo, CA

Role:

Apply an excellent understanding of javascript and how it can be exploited to recognize such attempts. Script crawlers for research, data collection and discovery of the most malicious aspects of the Internet.

Qualifications:

  • Javascript expert.
  • Javascript framework development.
  • SQL.
  • Web Security.
  • Bonus: Crawler Development.

back to top

Sr. PHP Developer

Location: San Mateo, CA

Role:

Develop and maintain web sites for specific security missions. Be a web development spy. Create web frameworks with hidden agendas for data collection.

Qualifications:

  • Wide range of web development techniques.
  • PHP expert.
  • SQL.
  • Javascript.
  • PHP framework development.

back to top

Sr. UI/Visualization Engineer – Norse Live Attack Map

Location: San Mateo, CA

Overview

Check out map.ipviking.com. How'd you like to own that visualization, and take it to the next level of awesomeness? This map has been featured on national television broadcasts on ABC, CBS, the BBC and all over Europe and Asia! Check out some examples here, here, and here.

Norse is looking for a rock star user interface / data visualization engineer to take our live attack map to the next level. Our map is already a viral success, but we have grand visions for it to help show off the strength of our live attack data. This position will work with our graphics designer to come up with the interface, and then be the sole developer for implementation and launch. The position requires strong CSS and javascript abilities and exceptional attention to detail. Demonstrated portfolio of work is essential. The ideal candidate will be highly self-motivated, task-oriented, and enthusiastic.

Required Skills and Experience:

  • Competency with HTML5/CSS3
  • Strong skillset in one or more areas of: SVG, WebGL, object-oriented Javascript experience, gaming-engines
  • Specific mapping visualization with real-time animations
  • Data Visualization experience (e.g. D3) using Javascript-based libraries or gaming engines
  • Experience with RESTful APIs
  • Experience building graphically sophisticated web applications (Canvas/WebGL)
  • Published portfolio focused around real-time graphical animations and data visualizations

back to top

Awesome Sales Engineers

Location: Washinton D.C.

Overview:

We are looking for proven rock stars - individuals with an entrepreneur spirit and a demonstrated track record of success working for security startups.

If you have been crushing your numbers for years, love working with other A+ players, and spend your nights and weekends learning more about cool hardware and software than any rational person should, we should talk.

Role:

This individual will play a central role increasing awareness, managing large, complex opportunities and ensuring our customers are successful. Proficiency driving solution demonstrations, responding to RFPs and preforming POCs are all fundamentals for this role.

Qualifications:

  • 10+ years working in a pre-sales role within the IT security industry
  • Excellent communication skills both written and verbal
  • Skilled with traditional security solutions like Firewalls, IPS and SIEMs
  • Skilled at system, network and security administration
  • CISSP, GIAC and related certifications are a plus
  • An active US security clearance is a requirement

back to top

Remarkable Professional Services Engineers

Location: Washinton D.C.

Overview:

We are looking for proven rock stars - individuals with an entrepreneur spirit and a demonstrated track record of success working for security startups.

If you enjoy working in a fast-paced company, with cutting edge technology surrounded by the best and brightest and have been called a hacker, geek, misfit or technophile, we should talk.

Role:

This individual will lead complex engagements, conduct detailed threat investigations, integrate disparate products, develop customized solutions, train customers and develop robust security strategies.

Qualifications:

  • 10+ years working in a professional services role within the IT security industry
  • Excellent communication skills both written and verbal
  • Skilled with traditional security solutions like Firewalls, IPS and SIEMs
  • Skilled at system, network and security administration
  • API, basic coding and scripting experience
  • CISSP, GIAC and related certifications are a plus
  • An active US security clearance is a requirement

back to top

Information Security Analyst

Location: San Mateo, CA

Overview:

Norse is seeking a qualified, motivated, and experienced Information Security Analyst with technical expertise and data analytics experience. We are an extremely fast-paced, security-driven company that requires coordination of team efforts to thrive. We provide unparalleled insight into suspect and malicious activity, as well as intelligence on the miscreants behind that activity, for fellow Information Security and IT professionals to use in mitigating threats to their networks and systems.

Role:

An experienced opportunity for an information security analyst familiar with analyzing massive amounts of data and applying mathematical, statistical, and other analytical tools in combination with a deep understanding of the discipline of information security in order to provide context for stakeholders and the community at large. The individual filling this will be reviewing our data looking for malicious actors, generating reports on such activity for consumption by staff, our customers, third parties, and the information security community as a whole. Such reporting will be technical in nature, digestible by C-level executives (such as Chief Information Security Officers (CISOs)), as well as technical information security and information technology practitioners. In addition, this role will provide recommendations and suggestions to enhance Norse's powerful live attack and advanced threat intelligence capabilities.

Required Skills:

  • Monitor, evaluating and interpreting: vulnerabilities/CVEs, mitigation measures and compensating controls, vulnerability assessments, system/device/IDS/IPS logs, threat analysis, malware, open and closed source reporting.
  • Understanding and in-depth knowledge regarding the administration, use, securing and exploiting common operating systems.
  • Understanding and in-depth knowledge regarding the administration, use, securing and exploiting common consumer and enterprise devices.
  • Thorough understanding of computer networking, routing and protocols.
  • Understanding of information security architecture; mitigations of threats and compensating controls.
  • Demonstrated experience and proven methods for performing information security incident management lifecycle, to include response and mitigations.
  • Experience with application of open- and closed-source information resources within the industry.
  • Demonstrated excellent communications skills, both oral and written, for working with a diverse, professional clientele with varying skill levels and technical experience/competency. Ability to interact with customers and staff in person and via written communications. Ability to research highly technical topics, pull together various sources into one concise technical document and put the research into process and procedural documentation and explain technical details clearly and concisely.
  • Willingness and desire to learn. Possess and nurture a hacker mentality, being able to visualize issues and possible solutions 'outside the box.' Must be a punctual, professional and devoted member of our team; with the ability to safeguard sensitive, restricted and other information deemed to have special handling and dissemination protocols.
  • High level of ethics and core values.

Preferred Skills:

  • Start-Up Experience.
  • Demonstrated experience and proven methods for performing analysis and interpretation of information from Security Operations Center (SOC) and/or Computer Security Incident Response Team (CSIRT) systems.
  • Understanding of digital forensics procedures and tools, malware analysis and reverse engineering
  • Fundamental understanding of statistics, mathematics and its application to the science of data analysis.
  • Certifications are great, if you have the practical experience to back them up. Having or aspiring to obtain SANS certifications such as GIAC Certified Incident Handler (GCIH) and/or GCIA: GIAC Certified Intrusion Analyst would be looked upon favorably. More importantly is being able to articulate and demonstrate skills, with the ability to obtain certification.

Educational / Certifications and Other Requirements:

  • Bachelor's degree, a combination of experience and/or Associates degree, or an equivalent combination of education and work experience. Degree must be from an accredited institution, prefer degree be in a technical discipline or majority of coursework in Information Security or Information Technology.
  • Minimum of five (5) years of Information Technology and/or Information Security experience. Minimum of 3+ (three plus) years of related experience in the field of Information Security, to include monitoring and detection, intrusion analysis, threat and/or vulnerability analysis

We offer a competitive salary and benefits. This is a full-time, exempt position reporting to the director of DarkWolf Labs. The responsibilities and duties described here are intended to provide typical examples of the role and are not comprehensive.


back to top

Information Security Vulnerability Research Analyst

Location: San Mateo, CA

Overview:

Norse is seeking a qualified, motivated, and experienced Information Security Vulnerability Research Analyst with technical expertise and research experience. We are an extremely fast-paced, security-driven company that requires coordination of team efforts to thrive. We provide unparalleled insight into suspect and malicious activity, as well as intelligence on the miscreants behind that activity, for fellow Information Security and IT professionals to use in mitigating threats to their networks and systems.

Role:

An opportunity for an experienced information security analyst familiar with finding vulnerabilities, those software mistakes in specification and design, as well as in programming. Taking those mistakes, determining possible mitigations and compensating controls, reviewing the Norse threat intelligence platform for correlating activity, and then generating reports on that activity for consumption by staff, our customers, third parties, and the information security community as a whole. Such reporting will be technical in nature, digestible by C-level executives (such as the Chief Information Security Officers (CISOs)) as well as technical information security and information technology practitioners. In addition, this role will provide recommendations and suggestions to enhance Norse's powerful live attack and advanced threat intelligence capabilities.

Required Skills:

  • Monitor, evaluating and interpreting: vulnerabilities/CVEs, mitigation measures and compensating controls, vulnerability assessments, system/device/IDS/IPS logs, threat analysis, malware, open and closed source reporting.
  • Thorough understanding of vulnerability research, exploit mitigation techniques and counter-measures.
  • Extensive knowledge of high level programming languages such as C/C++, python, assembly; as well as various scripting languages.
  • Experience with signature development and penetration testing, along with writing exploit code.
  • Experience with fault injection frameworks or fuzzing and virtualization.
  • Understanding and in-depth knowledge regarding the administration, use, securing and exploiting common operating systems.
  • Understanding and in-depth knowledge regarding the administration, use, securing and exploiting common consumer and enterprise devices.
  • Understanding of computer networking, routing and protocols.
  • Understanding of information security architecture; mitigations of threats and compensating controls.
  • Demonstrated excellent communications skills, both oral and written for working with a diverse, professional clientele with varying skill levels and technical experience/competency. Ability to interact with customers and staff in person and via written communications. Ability to research highly technical topics, pull together various sources into one concise technical document and put the research into process and procedural documentation and explain technical details clearly and concisely.
  • Willingness and desire to learn. Possess and nurture a hacker mentality, being able to visualize issues and possible solutions 'outside the box.' Must be a punctual, professional and devoted member of our team; with the ability to safeguard sensitive, restricted and other information deemed to have special handling and dissemination protocols.
  • High level of ethics and core values.

Preferred Skills:

  • Start-Up Experience.
  • Experience with the Common Vulnerabilities and Exposures (CVEs) process, from initial contact to publishing; including coordinating with vendors, FFRDCs and Government agencies.
  • Demonstrated experience and proven methods for performing analysis and interpretation of information from Security Operations Center (SOC) and/or Computer Security Incident Response Team (CSIRT) systems.
  • Understanding of digital forensics procedures and tools.
  • Understanding and in-depth knowledge regarding malware analysis and reverse engineering. Relevant experience involving WinDbg or OllyDbg, BinDiff and IDA Pro.
  • Demonstrated experience and proven methods for performing information security incident management lifecycle, to include response and mitigations.
  • Fundamental understanding of statistics, mathematics and its application to the science of data analysis.
  • Experience with application of open- and closed-source information resources within the industry.
  • Certifications are great, if you have the practical experience to back them up. Having or aspiring to obtain SANS certifications such as the following would be looked upon favorably. More importantly is being able to articulate and demonstrate skills, with the ability to obtain certification.
    • GPEN: GIAC Penetration Tester
    • GWAPT: GIAC Web Application Penetration Tester
    • GXPN: GIAC Exploit Researcher and Advanced Penetration Tester
    • GREM: GIAC Reverse Engineering Malware

Educational / Certifications and Other Requirements:

  • Bachelor's degree, a combination of experience and/or Associates degree, or an equivalent combination of education and work experience. Degree must be from an accredited institution, prefer degree be in a technical discipline or majority of coursework in Information Security or Information Technology.
  • Minimum of five (5) years of Information Technology and/or Information Security experience. Minimum of 3+ (three plus) years of related experience in the field of Information Security, to include monitoring and detection, intrusion analysis, threat and/or vulnerability analysis.

We offer a competitive salary and benefits. This is a full-time, exempt position reporting to the director of DarkWolf Labs. The responsibilities and duties described here are intended to provide typical examples of the role and are not comprehensive.


back to top

Intelligence Analyst

Location: San Mateo, CA

Overview:

Norse is recruiting intelligence analysts to work on a team to bring analysis and operations together to maximize the impact of resources against organizations and key individuals who pose a threat to cyber security.

Role:

Analysts will be asked to use unique datasets, specialized tools, and network analysis techniques to identify and analyze threats. Analysts identify opportunities to disrupt them, and evaluate the risks and benefits of proposed operations.

Analysts regularly produce a range of sophisticated short and longer-term analytic targeting intelligence products and provide close analytic support to operations for US policymakers, NATO Allies, military officials, and law enforcement agencies as well as the business environment.

Analysts focus on regions of the world and on functional topics including cyber threats, terrorism, narcotics trafficking, counterintelligence, and corporate espionage.

Qualifications:

  • Schoolhouse trained.
  • All-Source Analyst, SIGINT Analyst, CI Agent, HUMINT Collector, or Imagery Analyst.
  • Real world experience in the field.
  • In lieu of a schoolhouse trained analyst; minimum requirements include a bachelor's degree in foreign area study, international relations, political science, national security studies, or Geography.
  • Strong academic credentials in network analysis, stateless organizations, or intelligence analysis are a plus.
  • Familiarity with the intelligence communities reporting methods, ISR assets, Targeting, and GIS familiarity are required.
  • All applicants must successfully complete a thorough psychological exam, a polygraph interview and an extensive background investigation.
  • US citizenship is required.

back to top

Senior Technical Support Engineer

Location: San Mateo, CA

Overview:

We are seeking a qualified, motivated, and experienced technical support engineer with excellent customer skills and technical depth to interface with engineering to resolve user issues. We are an extremely fast-paced, security-driven company.

Role:

A ground-floor opportunity for a Technical Support Engineer. L2/L3 trouble-shooting of security cloud product in the Internet threat intelligence space. Work closely with engineering, sales engineering, and customers to troubleshoot both POCs and production problems.

Qualifications:

  • 4+ years experience.
  • Unix and Windows command line.
  • Configuring routing on network.
  • Scripting (shell, perl, etc).
  • LAMP web Stack.
  • APIs for the web including HTTP, XML, JSON and XML RPC.
  • Troubleshooting, installing, and configuring, OSS including LAMP and CMSs.
  • Experience at enterprise security vendor or hands-on with security products desired.

Preferred Skills:

  • Team lead experience.
  • Coding/scripting experience of any kind.

back to top

Developer Relations Director

Location: San Mateo, CA

Role:

Are you passionate about APIs? Then Norse has an exciting opportunity! As Developer Relations Director for Norse, you will be a key part of growing a diverse, vibrant and dynamic ecosystem. You will be responsible for working directly with our developers and technology partners to create innovative solutions integrated with the most powerful security API that exists today - IPViking. You'll be the voice that represents Norse’s Engineering team. This is a highly technical role where you will be expected to engage in hack-a-thons, meetups, user groups, and other technical workshops.

Job Responsibilities:

  • Writing code examples and tutorials for developers.
  • Blogging & answering questions in the Norse Developer Community and Forums.
  • Understanding and evangelizing the Norse IPViking APIs.
  • Working with customers and application partners to help them build innovative solutions.
  • Contributing to open source projects.

Required Skills:

  • Loves to write code.
  • Excellent written and verbal skills.
  • Ability to juggle and prioritize and manage time effectively.
  • Demonstrated leadership skills.
  • Comfortable leading meetings & presenting to large groups, e.g at conferences.
  • Ability to distill core message quickly, often on the fly.
  • 4+ years commercial application software development.
  • B.A. / B.S. Computer Science or equivalent.
  • Enterprise web application architecture experience (LAMP or equivalent) with RESTful APIs.
  • Experience in API design.
  • Contributed to product deliveries, ideally in a variety of languages (PHP, Python, Java, C/C++ etc.).

back to top