Filter Jobs
29
Available Jobs
Find your perfect opportunity
Federal Inside Sales Representative
Summary:
Corelight is a security startup headquartered in downtown San Francisco. We secure some of the most sensitive and mission-critical networks in the world, and our rapidly-growing customer base includes ten of the Fortune 50 and government agencies. Based on the Zeek Network Security Monitor, a beloveSenior Product Designer
Summary:
Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can’t avoid leaving digital footprints on the networks thEnterprise Account Executive - Southern California
Summary:
Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can’t avoid leaving digital footprints on the networks thEnterprise Account Executive - Washington, D.C.
Summary:
Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can’t avoid leaving digital footprints on the networks thSDET Manager
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologiesSenior Software Engineer
Summary:
Corelight is an early-stage security startup based in Santa Clara, CA, downtown San Francisco, and Columbus, OH. We secure some of the most sensitive and mission-critical networks in the world, and our rapidly-growing customer base includes nine of the Fortune 50. Based on the Zeek (formerly Bro) NeSenior UI Engineer, Investigator
Summary:
Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can’t avoid leaving digital footprints on the networks thStrategic Account Executive - Dallas
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls, and many other technologiesChannel Account Manager - TOLA
Summary:
Towards the end of our interview process is an in-person interview. At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can’t avoid leaving digital footprints on the neSr. Sales Engineer - Southern CA
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologiesSr. Sales Engineer - PacNW
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologiesSystems Architect
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologiesHuman Resources Business Partner
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologiesExecutive Assistant to CEO
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologiesSenior Product Designer
Summary:
Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can’t avoid leaving digital footprints on the networks thNetwork Security Trainer
Summary:
Towards the end of our interview process is an in-person interview. ***Location EMEA**** Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and manSenior Sales Engineer - North Central
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologiesLead Software Engineer - Container Infrastructure
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologiesSenior UI Engineer, Investigator
Summary:
Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies - but they can’t avoid leaving digital footprints on the networks thLead Software Development Engineer in Test
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologiesSr. Sales Engineer - Southeast
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologiesChannel Sales Engineer - East
Summary:
Towards the end of our interview process is an in-person interview. Do you want to help make the world safe from cyber attack? At Corelight, we believe that the best approach to cybersecurity risk starts with the network. Attackers can evade endpoint detection, firewalls and many other technologies