Certifications & training
We invest in your expertise.
We are committed to certifying our employees and training them in their profession — vendor certifications, regulated-industry frameworks, and continuous learning paths funded by the group.
Post-quantum cryptography: Gartner® recommendations available with NEVERHACKGartner — Post-quantum readiness
Access the reportCareers
We hold high standards — and we sincerely believe in your potential.
Invest in your future. Whatever your starting point — junior analyst, seasoned engineer, mid-career switch — we have a career plan for you across NEVERHACK's offices in 13+ countries.
13+
Countries
Across 4 continents
25+
Offices
From Paris to Singapore
18+
Specialty roles
From SOC to red team
40+
Years of expertise
Since 1983
What we offer
Certifications & training
We are committed to certifying our employees and training them in their profession — vendor certifications, regulated-industry frameworks, and continuous learning paths funded by the group.
International career path
Each employee can apply to our international mobility programme and spend time in one of our offices around the world to deepen a specific area of expertise — operational, technical, or strategic.
Expertise
Designs, implements, and maintains the security solutions that protect enterprise networks end-to-end.
Implements the controls that keep sensitive data out of unauthorised hands and out of public leaks.
Monitors security events in real time, triages alerts, and drives the response when something fires.
Watches systems for anomalies, investigates incidents, and shapes the detection rules that catch the next one.
Reverse-engineers samples, hardens endpoints, and tunes the defences that stop the next strain.
Maps the regulatory landscape (NIS2, DORA, ISO 27001) onto the business and steers the audit cycle.
Runs technical and organisational audits — pinpoints gaps, prioritises remediation, signs off.
Secures cloud workloads across IaaS, PaaS, and SaaS — IAM, network, posture, and runtime.
Designs identity and access architectures: SSO, MFA, lifecycle, privileged access, federation.
Mines open-source intelligence to map adversaries, surface exposure, and inform threat models.
Protects industrial control systems and operational technology where availability is non-negotiable.
Hardens firmware, boot chains, and embedded stacks — from connected devices to defence-grade hardware.
Tracks threat actors, TTPs, and campaigns. Translates intelligence into actionable detection and response.
Breaks systems on purpose — web, infra, mobile, cloud — to find what attackers would find first.
Operates the Vulnerability Operations Centre: continuous scanning, prioritisation, and remediation tracking.
Builds and delivers technical training programmes — from analyst onboarding to advanced red-team curricula.
Leads incident response under pressure: technical, organisational, communication, and recovery.
Emulates real adversaries end-to-end — initial access, persistence, lateral movement, objectives.
Open roles
All current openings — country, level, and team — are published on our LinkedIn jobs page. Apply directly there or save the link to revisit when a fitting role opens up.
Browse our open rolesWhere we are
Aix-en-Provence · Grenoble · Le Kremlin-Bicêtre · Lille · Lyon · Paris · Rennes · Toulon · Toulouse
Cagliari · Milan · Naples · Potenza · Rome · Turin
Barcelona · Madrid
Brussels
Tallinn
Montreal
New York
Mexico City · Querétaro
Singapore
Abu Dhabi
Before the call
What to expect at each step of our process — and how to put your best foot forward. We share these openly so the call is a real conversation, not a guessing game.
Walk us through your professional journey at your own pace — what you learned, what you built, what you'd do differently.
Highlight the skills you've actually used and where they made a difference, not just a list.
Mention any vendor or framework certifications you hold or are working towards.
Tell us about your career ambitions — we hire for trajectory, not just current role.
Take the time to learn what NEVERHACK ships before the call — products, sectors, geographies.
Be ready to switch into English. A working level is enough; we don't expect perfection.
Be transparent about how you'd integrate — pace, working style, what would derail you.
Read every brief in full before you write a single line — half the difficulty is in framing the problem correctly.
Show your reasoning, not just the answer. We grade thought process as much as the final output.
Stick to the time budget. Submitting a clean, partial solution is stronger than an unfinished sprawling one.
Document trade-offs you considered and rejected — it tells us how you'd argue in a design review.
If you're stuck, write down what you tried and what you'd do next given more time. We read it.
Be ready to whiteboard. Most technical conversations involve drawing an architecture, a flow, or a threat model live.
Pick one or two recent projects you can talk about end to end — context, your role, what shipped, what you'd change.
Ask sharp questions about the team, the stack, and the constraints. We listen to the questions as much as the answers.
Own your gaps. Saying "I haven't worked with X but here's how I'd approach it" beats faking familiarity.
Bring opinions on tooling and methodology, but hold them lightly. Strong opinions, weakly held.