Censys knows the Cloud and the Internet better than anyone else. Attack Surface Management provides customers with an attacker-centric view of all externally facing Cloud and Internet assets to extend visibility, prioritize, and remediate the most critical risk exposures that will actually lead to a breach. Our daily IPv4 scans and the world’s largest SSL/TLS Certificate database enables customers with the most accurate and continuously updated attack surfaces. Enterprise security teams leverage Censys to keep pace with the speed of the business and gain an advantage on the rapidly evolving cyber-attack threats.

We are a rapidly growing cyber security startup based in Ann Arbor, Michigan with a 100% fully remote team. Our innovation is fueled by the team’s global perspectives and diverse backgrounds. We welcome healthy debate, constructive conversations, and outside-the-box thinking to ensure we are moving fast, learning things, and iterating quickly.

Role Summary:

We’re looking to hire a Vulnerability Engineer and Researcher who will help to extend Censys’ ability globally to fingerprint Internet vulnerabilities. This is hybrid role that involves both software development and cybersecurity research:

On the software development side, you will help improve our risk detection engine and vulnerability database by building detectors for common vulnerabilities and emerging threats. You will utilize Censys risk fingerprinting tools, scanning infrastructure, and frameworks to productionize risk identification for our Enterprise Data Sets and Attack Surface Management platform. You will work with an existing software engineering team.

On the security research side, you will help conduct reconnaissance to expand our capabilities to capture and monitor internet resources for risks. More generally, you will collaborate with Product Management and Engineering to develop Censys’ risk identification strategy and process. Finally, you will work as a member of our research team to produce research content for the broader cybersecurity community and to share results in blog posts, in webinars, and at industry events like Black Hat, BSides, and DEFCON.

This is a great opportunity for a software engineer who wants to take their cybersecurity knowledge to the next level. Due to the existing team with senior members eager to mentor, you will be supported in your development.

Role Responsibilities:

  • Extend capabilities of our risk detection engine by prototyping or adding new vulnerability or misconfiguration detections to the product
  • Review existing risks to proactively identify ways to tune for higher accuracy (fewer false positives / false negatives)
  • Review existing risks to proactively improve risk implementation and architecture
  • Respond to customer reported false positives to improve the accuracy of existing risks
  • Submit feature requests for the Censys risk detection engine and, in time, contribute to its codebase
  • Maintain a close relationship with Product Management and Engineering
  • Occasionally support the Customer Success and Sales Engineering teams with customer or partnership calls to provide technical expertise and sales enablement
  • Occasionally work on blog posts based to help promote the brand and thought leadership
  • Identify, submit proposals, and present at industry events such as Black Hat, DEF CON, and BSides

Desired Qualifications:

  • 1+ years of experience as software developer
  • 1+ years of experience with network protocols and/or cybersecurity 
  • Working knowledge of data formats, querying large datasets, and performing aggregations and analysis using SQL
  • Strong verbal, written, and presentation communication skills
  • A passion for continuous learning and curiosity

Nice-to-Have Qualifications:

    • Proficiency in BigQuery or past experience with querying large datasets on other platforms
    • Experience with risk and vulnerability management and the ability to create and help integrate risks into public datasets, frameworks, and APIs used by customer facing applications
    • Familiarity with vulnerability databases such as MITRE, OWASP, and NIST
    • Able to understand the high level architecture of a security stack for a large enterprise and how adversaries will look for holes in it
    • Hands on experience with creating security detections, policies or automation in one or more of the following tools: Firewall, Routers, WAF (Web Application Firewall) , SIEM, IDS, Application Security, SOAR, XDR, Cloud Security 

Our target salary range for this role is between $110,000 USD and $140,000 USD + bonus eligibility and equity.

We are located in Ann Arbor, Michigan, however we are open to hiring this position fully remote, with travel opportunities to meet customers and connect with colleagues.

Don't meet every single requirement? Studies have shown that women and people of color are less likely to apply to jobs unless they feel they meet every qualification. At Censys we are dedicated to building a diverse, inclusive, and authentic workplace - so if you're excited about this role but your past experience doesn't align perfectly with every listed requirement in the job description, we encourage you to apply anyways. You may be exactly who we need to fill this role or others! 

We value diversity and are committed to creating an inclusive environment for all employees. Censys is an equal opportunity employer.

Apply for this Job

* Required
resume chosen  
(File types: pdf, doc, docx, txt, rtf)
cover_letter chosen  
(File types: pdf, doc, docx, txt, rtf)


Voluntary Self-Identification

For government reporting purposes, we ask candidates to respond to the below self-identification survey. Completion of the form is entirely voluntary. Whatever your decision, it will not be considered in the hiring process or thereafter. Any information that you do provide will be recorded and maintained in a confidential file.

As set forth in Censys’s Equal Employment Opportunity policy, we do not discriminate on the basis of any protected group status under any applicable law.

Race & Ethnicity Definitions

If you believe you belong to any of the categories of protected veterans listed below, please indicate by making the appropriate selection. As a government contractor subject to the Vietnam Era Veterans Readjustment Assistance Act (VEVRAA), we request this information in order to measure the effectiveness of the outreach and positive recruitment efforts we undertake pursuant to VEVRAA. Classification of protected categories is as follows:

A "disabled veteran" is one of the following: a veteran of the U.S. military, ground, naval or air service who is entitled to compensation (or who but for the receipt of military retired pay would be entitled to compensation) under laws administered by the Secretary of Veterans Affairs; or a person who was discharged or released from active duty because of a service-connected disability.

A "recently separated veteran" means any veteran during the three-year period beginning on the date of such veteran's discharge or release from active duty in the U.S. military, ground, naval, or air service.

An "active duty wartime or campaign badge veteran" means a veteran who served on active duty in the U.S. military, ground, naval or air service during a war, or in a campaign or expedition for which a campaign badge has been authorized under the laws administered by the Department of Defense.

An "Armed forces service medal veteran" means a veteran who, while serving on active duty in the U.S. military, ground, naval or air service, participated in a United States military operation for which an Armed Forces service medal was awarded pursuant to Executive Order 12985.


Form CC-305

OMB Control Number 1250-0005

Expires 05/31/2023

Voluntary Self-Identification of Disability

Why are you being asked to complete this form?

We are a federal contractor or subcontractor required by law to provide equal employment opportunity to qualified people with disabilities. We are also required to measure our progress toward having at least 7% of our workforce be individuals with disabilities. To do this, we must ask applicants and employees if they have a disability or have ever had a disability. Because a person may become disabled at any time, we ask all of our employees to update their information at least every five years.

Identifying yourself as an individual with a disability is voluntary, and we hope that you will choose to do so. Your answer will be maintained confidentially and not be seen by selecting officials or anyone else involved in making personnel decisions. Completing the form will not negatively impact you in any way, regardless of whether you have self-identified in the past. For more information about this form or the equal employment obligations of federal contractors under Section 503 of the Rehabilitation Act, visit the U.S. Department of Labor’s Office of Federal Contract Compliance Programs (OFCCP) website at www.dol.gov/ofccp.

How do you know if you have a disability?

You are considered to have a disability if you have a physical or mental impairment or medical condition that substantially limits a major life activity, or if you have a history or record of such an impairment or medical condition.

Disabilities include, but are not limited to:

  • Autism
  • Autoimmune disorder, for example, lupus, fibromyalgia, rheumatoid arthritis, or HIV/AIDS
  • Blind or low vision
  • Cancer
  • Cardiovascular or heart disease
  • Celiac disease
  • Cerebral palsy
  • Deaf or hard of hearing
  • Depression or anxiety
  • Diabetes
  • Epilepsy
  • Gastrointestinal disorders, for example, Crohn's Disease, or irritable bowel syndrome
  • Intellectual disability
  • Missing limbs or partially missing limbs
  • Nervous system condition for example, migraine headaches, Parkinson’s disease, or Multiple sclerosis (MS)
  • Psychiatric condition, for example, bipolar disorder, schizophrenia, PTSD, or major depression

PUBLIC BURDEN STATEMENT: According to the Paperwork Reduction Act of 1995 no persons are required to respond to a collection of information unless such collection displays a valid OMB control number. This survey should take about 5 minutes to complete.