
Careers
Build your cybersecurity career by joining our team
Fluid Attacks is a company dedicated to helping organizations develop secure software that primarily guarantees the protection and privacy of the sensitive information and assets of their users.



Careers
Build your cybersecurity career by joining our team
Fluid Attacks is a company dedicated to helping organizations develop secure software that primarily guarantees the protection and privacy of the sensitive information and assets of their users.


Careers
Build your cybersecurity career by joining our team
Fluid Attacks is a company dedicated to helping organizations develop secure software that primarily guarantees the protection and privacy of the sensitive information and assets of their users.




What we do
Continuous and comprehensive security testing
Our Continuous Hacking solution combines our own tools, AI and certified pentesters throughout our clients' entire software development lifecycles to identify security vulnerabilities accurately. In addition to reporting risk exposure promptly, we support them in achieving high remediation rates and guaranteeing high-quality products to their users.
What we are looking for
People who are passionate about what they do
We give little thought to what formal studies you have undertaken or completed, or even if you have any. Beyond your accredited experience, we are interested in your abilities, such as discipline, honesty and responsibility, and your willingness to learn and work in a team.



Open jobs
Positions for which we are actively seeking the best talent
Pentester
Software developer
IT project manager
IT helpdesk support
We need people who, beyond an interest in programming, show curiosity and enthusiasm in evaluating the security of IT systems through ethical hacking or penetration testing.
You should have at least basic software development and cybersecurity knowledge, a B1 level of English, and, ideally, some experience in hacking challenges or contests such as CTFs.

Pentester
Software developer
IT project manager
IT helpdesk support
We need people who, beyond an interest in programming, show curiosity and enthusiasm in evaluating the security of IT systems through ethical hacking or penetration testing.
You should have at least basic software development and cybersecurity knowledge, a B1 level of English, and, ideally, some experience in hacking challenges or contests such as CTFs.

Pentester
Software developer
IT project manager
IT helpdesk support
We need people who, beyond an interest in programming, show curiosity and enthusiasm in evaluating the security of IT systems through ethical hacking or penetration testing.
You should have at least basic software development and cybersecurity knowledge, a B1 level of English, and, ideally, some experience in hacking challenges or contests such as CTFs.

Pentester
Software developer
IT project manager
IT helpdesk support
We need people who, beyond an interest in programming, show curiosity and enthusiasm in evaluating the security of IT systems through ethical hacking or penetration testing.
You should have at least basic software development and cybersecurity knowledge, a B1 level of English, and, ideally, some experience in hacking challenges or contests such as CTFs.

Reasons to work with Fluid Attacks
Remote working
You do not have to attend an office. You can be anywhere on Earth and still be part of our team and fulfill your responsibilities.
Remote working
You do not have to attend an office. You can be anywhere on Earth and still be part of our team and fulfill your responsibilities.
Remote working
You do not have to attend an office. You can be anywhere on Earth and still be part of our team and fulfill your responsibilities.
Remote working
You do not have to attend an office. You can be anywhere on Earth and still be part of our team and fulfill your responsibilities.
Flexible hours
Your work is full-time, but you can choose the hours of the day to do it according to your needs and preferences. If required, we can make arrangements.
Flexible hours
Your work is full-time, but you can choose the hours of the day to do it according to your needs and preferences. If required, we can make arrangements.
Flexible hours
Your work is full-time, but you can choose the hours of the day to do it according to your needs and preferences. If required, we can make arrangements.
Flexible hours
Your work is full-time, but you can choose the hours of the day to do it according to your needs and preferences. If required, we can make arrangements.
Ongoing learning
We provide you access to and payment for courses and exams to achieve certifications related to your work within the company and improve in it.
Ongoing learning
We provide you access to and payment for courses and exams to achieve certifications related to your work within the company and improve in it.
Ongoing learning
We provide you access to and payment for courses and exams to achieve certifications related to your work within the company and improve in it.
Ongoing learning
We provide you access to and payment for courses and exams to achieve certifications related to your work within the company and improve in it.
Outstanding team
Our team is full of talented, multi-certified individuals with whom you can share knowledge and participate in international cybersecurity events.
Outstanding team
Our team is full of talented, multi-certified individuals with whom you can share knowledge and participate in international cybersecurity events.
Outstanding team
Our team is full of talented, multi-certified individuals with whom you can share knowledge and participate in international cybersecurity events.
Outstanding team
Our team is full of talented, multi-certified individuals with whom you can share knowledge and participate in international cybersecurity events.
Pay progression
Your salary may increase according to your job performance, which is periodically evaluated by your immediate supervisor and other members of our management team.
Pay progression
Your salary may increase according to your job performance, which is periodically evaluated by your immediate supervisor and other members of our management team.
Pay progression
Your salary may increase according to your job performance, which is periodically evaluated by your immediate supervisor and other members of our management team.
Pay progression
Your salary may increase according to your job performance, which is periodically evaluated by your immediate supervisor and other members of our management team.
Personal wellness
We sponsor and connect you with external coaching and therapy sessions to help you achieve personal or professional goals.
Personal wellness
We sponsor and connect you with external coaching and therapy sessions to help you achieve personal or professional goals.
Personal wellness
We sponsor and connect you with external coaching and therapy sessions to help you achieve personal or professional goals.
Personal wellness
We sponsor and connect you with external coaching and therapy sessions to help you achieve personal or professional goals.
Greatly skilled people working together
"Greatly skilled people working together"
Fluid Attacks' research team — our company being one of the few Latin American CNAs — has contributed to the discovery and disclosure of more than 300 CVEs in open-source software projects.
Fluid Attacks' team of pentesters has around 60 offensive security certifications, including OSEE, OSCE, eCPTX, GXPN, eWPTX, CRTL and CRTM. Besides, our PTaaS is validated by CREST.
Do you have any questions?
If so, we invite you to first explore the frequently asked questions about applying for and working at Fluid Attacks. If what you want to ask is not there, you can write to us at careers@fluidattacks.com.
You might be interested in

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Targets
Resources


SOC 2 Type II
SOC 3
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Targets
Resources


SOC 2 Type II
SOC 3
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Targets
Resources


SOC 2 Type II
SOC 3
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2025 Fluid Attacks. We hack your software.

Fluid Attacks' solutions enable organizations to identify, prioritize, and remediate vulnerabilities in their software throughout the SDLC. Supported by AI, automated tools, and pentesters, Fluid Attacks accelerates companies' risk exposure mitigation and strengthens their cybersecurity posture.
Targets
Resources


SOC 2 Type II
SOC 3
Subscribe to our newsletter
Stay updated on our upcoming events and latest blog posts, advisories and other engaging resources.
© 2025 Fluid Attacks. We hack your software.