Careers

Build your cybersecurity career by joining our team

Fluid Attacks is a company dedicated to helping organizations develop secure software that primarily guarantees the protection and privacy of the sensitive information and assets of their users.

Careers

Build your cybersecurity career by joining our team

Fluid Attacks is a company dedicated to helping organizations develop secure software that primarily guarantees the protection and privacy of the sensitive information and assets of their users.

Careers

Build your cybersecurity career by joining our team

Fluid Attacks is a company dedicated to helping organizations develop secure software that primarily guarantees the protection and privacy of the sensitive information and assets of their users.

What we do

Continuous and comprehensive security testing

Our Continuous Hacking solution combines our own tools, AI and certified pentesters throughout our clients' entire software development lifecycles to identify security vulnerabilities accurately. In addition to reporting risk exposure promptly, we support them in achieving high remediation rates and guaranteeing high-quality products to their users.

What we are looking for

People who are passionate about what they do

We give little thought to what formal studies you have undertaken or completed, or even if you have any. Beyond your accredited experience, we are interested in your abilities, such as discipline, honesty and responsibility, and your willingness to learn and work in a team.

Open jobs

Positions for which we are actively seeking the best talent

Pentester
Software developer
IT project manager
IT helpdesk support

We need people who, beyond an interest in programming, show curiosity and enthusiasm in evaluating the security of IT systems through ethical hacking or penetration testing.

You should have at least basic software development and cybersecurity knowledge, a B1 level of English, and, ideally, some experience in hacking challenges or contests such as CTFs.

Pentester
Software developer
IT project manager
IT helpdesk support

We need people who, beyond an interest in programming, show curiosity and enthusiasm in evaluating the security of IT systems through ethical hacking or penetration testing.

You should have at least basic software development and cybersecurity knowledge, a B1 level of English, and, ideally, some experience in hacking challenges or contests such as CTFs.

Pentester
Software developer
IT project manager
IT helpdesk support

We need people who, beyond an interest in programming, show curiosity and enthusiasm in evaluating the security of IT systems through ethical hacking or penetration testing.

You should have at least basic software development and cybersecurity knowledge, a B1 level of English, and, ideally, some experience in hacking challenges or contests such as CTFs.

Pentester
Software developer
IT project manager
IT helpdesk support

We need people who, beyond an interest in programming, show curiosity and enthusiasm in evaluating the security of IT systems through ethical hacking or penetration testing.

You should have at least basic software development and cybersecurity knowledge, a B1 level of English, and, ideally, some experience in hacking challenges or contests such as CTFs.

Reasons to work with Fluid Attacks

Remote working

You do not have to attend an office. You can be anywhere on Earth and still be part of our team and fulfill your responsibilities.

Remote working

You do not have to attend an office. You can be anywhere on Earth and still be part of our team and fulfill your responsibilities.

Remote working

You do not have to attend an office. You can be anywhere on Earth and still be part of our team and fulfill your responsibilities.

Remote working

You do not have to attend an office. You can be anywhere on Earth and still be part of our team and fulfill your responsibilities.

Flexible hours

Your work is full-time, but you can choose the hours of the day to do it according to your needs and preferences. If required, we can make arrangements.

Flexible hours

Your work is full-time, but you can choose the hours of the day to do it according to your needs and preferences. If required, we can make arrangements.

Flexible hours

Your work is full-time, but you can choose the hours of the day to do it according to your needs and preferences. If required, we can make arrangements.

Flexible hours

Your work is full-time, but you can choose the hours of the day to do it according to your needs and preferences. If required, we can make arrangements.

Ongoing learning

We provide you access to and payment for courses and exams to achieve certifications related to your work within the company and improve in it.

Ongoing learning

We provide you access to and payment for courses and exams to achieve certifications related to your work within the company and improve in it.

Ongoing learning

We provide you access to and payment for courses and exams to achieve certifications related to your work within the company and improve in it.

Ongoing learning

We provide you access to and payment for courses and exams to achieve certifications related to your work within the company and improve in it.

Outstanding team

Our team is full of talented, multi-certified individuals with whom you can share knowledge and participate in international cybersecurity events.

Outstanding team

Our team is full of talented, multi-certified individuals with whom you can share knowledge and participate in international cybersecurity events.

Outstanding team

Our team is full of talented, multi-certified individuals with whom you can share knowledge and participate in international cybersecurity events.

Outstanding team

Our team is full of talented, multi-certified individuals with whom you can share knowledge and participate in international cybersecurity events.

Pay progression

Your salary may increase according to your job performance, which is periodically evaluated by your immediate supervisor and other members of our management team.

Pay progression

Your salary may increase according to your job performance, which is periodically evaluated by your immediate supervisor and other members of our management team.

Pay progression

Your salary may increase according to your job performance, which is periodically evaluated by your immediate supervisor and other members of our management team.

Pay progression

Your salary may increase according to your job performance, which is periodically evaluated by your immediate supervisor and other members of our management team.

Personal wellness

We sponsor and connect you with external coaching and therapy sessions to help you achieve personal or professional goals.

Personal wellness

We sponsor and connect you with external coaching and therapy sessions to help you achieve personal or professional goals.

Personal wellness

We sponsor and connect you with external coaching and therapy sessions to help you achieve personal or professional goals.

Personal wellness

We sponsor and connect you with external coaching and therapy sessions to help you achieve personal or professional goals.

Greatly skilled people working together

"Greatly skilled people working together"

Fluid Attacks' research team — our company being one of the few Latin American CNAs — has contributed to the discovery and disclosure of more than 300 CVEs in open-source software projects.

Fluid Attacks' team of pentesters has around 60 offensive security certifications, including OSEE, OSCE, eCPTX, GXPN, eWPTX, CRTL and CRTM. Besides, our PTaaS is validated by CREST.

Do you have any questions?

If so, we invite you to first explore the frequently asked questions about applying for and working at Fluid Attacks. If what you want to ask is not there, you can write to us at careers@fluidattacks.com.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

SOC 2 Type II

SOC 3

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

SOC 2 Type II

SOC 3

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

SOC 2 Type II

SOC 3

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.

SOC 2 Type II

SOC 3

Subscribe to our newsletter

Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.

© 2025 Fluid Attacks. We hack your software.