The Securify Match
There is no catch-all diploma or certification for creative thinkers with a strong hacker mind-set. Our team, therefore, consists of players with different backgrounds. Software development, electronics, informatics, graphic design, mathematics, and even psychology. Oftentimes, it’s people who have immersed themselves into (software) security out of their intrinsic drive and passion!
At Securify we are fully focused on software, products, networks and the way organizations and society depend on it. In our view, this is by far the most important part of cyber security! It encompasses our most personal information, and the totality of most business operations. We even entrust software with our health and lives. It is everywhere, impossible to ignore, and growing at unprecedented speed. It is our mission to help companies build and use software in a responsible and safe way, put an end to the stream of large data leaks and incidents, and create a safer digital future! We need a bunch of passionate heroes for that!
Job requirements
If you are unsure if you meet all the requirements, just apply!
Primary activities
Well, that’s easy. The Backend Developer realizes the backend components as they are functionally described on the backlog.
Work environment
We like to work on new, green field projects. We explore and apply new possibilities in technology. We help each other and give constructive feedback on each other's work. We develop simple code that is testable. We ensure an effective recording of our work. Security is important to us and has our attention when picking up every story. Our working method is Scrum, with a lot of attention for self-management.
We value creativity and take the time to learn about new developments, for example by following training courses and attending conferences.
We’ve taken the "play hard" part a little too far now, though. So, go insane during a game of Foosball with colleagues, or fuzzing, playing on one of our consoles or our cuddly mascot Tight-Tiger if you need some inspiration or love. In addition, we also have an established research program where you can request dedicated research time for your own ideas or participate in team research projects.
A regularly occurring treat is our epic dinners with the whole team, and we close the week with a nice drink that we often combine with random talks from colleagues. These talks can be about all kinds of subjects such as security research, the most beautiful hack of the week, new exploits, useful tools, trips to security conferences, but also own hobbies such as brewing beer.