Gartner — Post-quantum readiness

Access the report

Careers

Be the exception.

We hold high standards — and we sincerely believe in your potential.

Invest in your future. Whatever your starting point — junior analyst, seasoned engineer, mid-career switch — we have a career plan for you across NEVERHACK's offices in 13+ countries.

13+

Countries

Across 4 continents

25+

Offices

From Paris to Singapore

18+

Specialty roles

From SOC to red team

40+

Years of expertise

Since 1983

What we offer

Regardless of your starting point,
we have a career plan for you.

Certifications & training

We invest in your expertise.

We are committed to certifying our employees and training them in their profession — vendor certifications, regulated-industry frameworks, and continuous learning paths funded by the group.

International career path

Build a career across continents.

Each employee can apply to our international mobility programme and spend time in one of our offices around the world to deepen a specific area of expertise — operational, technical, or strategic.

Expertise

18 specialty tracks.
One mission.

Network security engineer

Designs, implements, and maintains the security solutions that protect enterprise networks end-to-end.

Data protection specialist

Implements the controls that keep sensitive data out of unauthorised hands and out of public leaks.

SOC analyst

Monitors security events in real time, triages alerts, and drives the response when something fires.

Cybersecurity analyst

Watches systems for anomalies, investigates incidents, and shapes the detection rules that catch the next one.

Malware protection expert

Reverse-engineers samples, hardens endpoints, and tunes the defences that stop the next strain.

Compliance manager

Maps the regulatory landscape (NIS2, DORA, ISO 27001) onto the business and steers the audit cycle.

Cybersecurity auditor

Runs technical and organisational audits — pinpoints gaps, prioritises remediation, signs off.

Cloud security engineer

Secures cloud workloads across IaaS, PaaS, and SaaS — IAM, network, posture, and runtime.

IAM specialist

Designs identity and access architectures: SSO, MFA, lifecycle, privileged access, federation.

OSINT analyst

Mines open-source intelligence to map adversaries, surface exposure, and inform threat models.

ICS / OT security engineer

Protects industrial control systems and operational technology where availability is non-negotiable.

Embedded systems security

Hardens firmware, boot chains, and embedded stacks — from connected devices to defence-grade hardware.

CTI analyst

Tracks threat actors, TTPs, and campaigns. Translates intelligence into actionable detection and response.

Penetration tester

Breaks systems on purpose — web, infra, mobile, cloud — to find what attackers would find first.

VOC analyst

Operates the Vulnerability Operations Centre: continuous scanning, prioritisation, and remediation tracking.

Cybersecurity trainer

Builds and delivers technical training programmes — from analyst onboarding to advanced red-team curricula.

Cyber-crisis manager

Leads incident response under pressure: technical, organisational, communication, and recovery.

Red team operator

Emulates real adversaries end-to-end — initial access, persistence, lateral movement, objectives.

Open roles

Live on LinkedIn.
Updated weekly.

All current openings — country, level, and team — are published on our LinkedIn jobs page. Apply directly there or save the link to revisit when a fitting role opens up.

Browse our open roles

Where we are

25+ offices, 13+ countries,
4 continents.

France

Aix-en-Provence · Grenoble · Le Kremlin-Bicêtre · Lille · Lyon · Paris · Rennes · Toulon · Toulouse

Italy

Cagliari · Milan · Naples · Potenza · Rome · Turin

Spain

Barcelona · Madrid

Belgium

Brussels

Estonia

Tallinn

Canada

Montreal

United States

New York

Mexico

Mexico City · Querétaro

Singapore

Singapore

United Arab Emirates

Abu Dhabi

Before the call

Learn our tips.
Ensure your success.

What to expect at each step of our process — and how to put your best foot forward. We share these openly so the call is a real conversation, not a guessing game.

How to prepare for the HR interview?
  1. 01.

    Walk us through your professional journey at your own pace — what you learned, what you built, what you'd do differently.

  2. 02.

    Highlight the skills you've actually used and where they made a difference, not just a list.

  3. 03.

    Mention any vendor or framework certifications you hold or are working towards.

  4. 04.

    Tell us about your career ambitions — we hire for trajectory, not just current role.

  5. 05.

    Take the time to learn what NEVERHACK ships before the call — products, sectors, geographies.

  6. 06.

    Be ready to switch into English. A working level is enough; we don't expect perfection.

  7. 07.

    Be transparent about how you'd integrate — pace, working style, what would derail you.

How to succeed on our Challenge platform?
  1. 01.

    Read every brief in full before you write a single line — half the difficulty is in framing the problem correctly.

  2. 02.

    Show your reasoning, not just the answer. We grade thought process as much as the final output.

  3. 03.

    Stick to the time budget. Submitting a clean, partial solution is stronger than an unfinished sprawling one.

  4. 04.

    Document trade-offs you considered and rejected — it tells us how you'd argue in a design review.

  5. 05.

    If you're stuck, write down what you tried and what you'd do next given more time. We read it.

How to succeed in your interaction with our technical managers?
  1. 01.

    Be ready to whiteboard. Most technical conversations involve drawing an architecture, a flow, or a threat model live.

  2. 02.

    Pick one or two recent projects you can talk about end to end — context, your role, what shipped, what you'd change.

  3. 03.

    Ask sharp questions about the team, the stack, and the constraints. We listen to the questions as much as the answers.

  4. 04.

    Own your gaps. Saying "I haven't worked with X but here's how I'd approach it" beats faking familiarity.

  5. 05.

    Bring opinions on tooling and methodology, but hold them lightly. Strong opinions, weakly held.