Join a stealth-mode AI security startup backed by Team8, building foundational technology to understand and secure how AI systems interact with the world — starting at the network and protocol layer.
We’re looking for a hands-on technical lead to own one of our most critical domains — traffic, protocols, and AI behavior. You’ll combine deep technical understanding with strong operational instincts to build systems, workflows, and insights that power our core product.
If you’re a security researcher, data analyst, or systems engineer who thrives on exploring complex data, building scalable solutions, and turning ambiguity into clarity — this might be your next big step.
What You’ll Do
- Take ownership of the traffic and protocol analysis domain — from data collection to insight generation.
- Design and build data and analysis pipelines, integrating both software engineering and analytical methods.
- Investigate AI-driven traffic, model interactions, and communication behaviors across systems and networks.
- Work closely with Product and Operations to connect technical work with real-world customer use cases.
- Develop tools, automations, and workflows that enable the team to move faster and deliver consistent, high-quality results.
- Lead by example — through hands-on research, technical depth, and operational excellence.
- Collaborate across engineering, research, and product to shape our detection logic and system intelligence.
Requirements:
Who You Are
- A strong technical generalist - comfortable reasoning about systems, analyzing data, and building tools or pipelines.
- Experienced with traffic analysis, protocol inspection, or large-scale data exploration.
- Analytical and curious - you enjoy exploring how systems behave and uncovering patterns in complex environments.
- Operationally strong - you care about efficiency, reliability, and building processes that scale.
- Comfortable taking initiative and leading projects, even without formal management experience.
- Eager to learn, experiment, and grow in an environment that values autonomy, creativity, and impact.
Bonus Points
- Experience with Wireshark, Zeek, mitmproxy, Burp, or other traffic and security tools.
- Background in security research, threat analysis, or reverse engineering.
- Familiarity with AI model behaviors, LLM interactions, or protocol-level communication patterns.
- Experience automating workflows or building data systems in distributed or cloud environments.
Why This Role Matters
This is a core hands-on leadership role at the intersection of engineering, data, and security.
You’ll define how our systems see and understand the world — designing the technology, processes, and insights that power our mission to secure AI.