We are hiring! And we are convinced, the best process is always the most simple one!

To apply, just send us an email with a text about you and why you are interested. Don’t forget your contact details. In addition, you can send your CV to:

hr@deepanddark.com or via our application form:

Application Form

This is what we expect from any applicant

What we are doing is challenging even for proven experts. Therefore, if you are already an expert in your field with both academic as well as professional experience and with an additional amount of energy, you should consider working with us. If you are highly passionate about technology and engineering, you will find people like you in our team. If you are constantly increasing your professionalism, we would love to hear from you. If you are not a proven professional, there is a tiny chance for you. Try it.

To work with us, you should have at least these general character traits and skills:

  • good analytical understanding of peoples behavior and expressions

  • considerate communication and negotiation skills

  • precise language usage and thorough documentation

  • positive and optimistic mindset

  • relaxed about mistakes and surprising changes

  • trustworthiness

These are the organizational roles available for application:

Security Requirements Engineer

For this organizational role we expect you to have the following knowledge:

  • information security

  • lifecycle of requirements

  • relational datastructures

Your skills should include:

  • system design thinking

  • hands on programming skills

  • analytical understanding of peoples expressions

  • considerate communication and negotiation skills

  • precise language usage and thorough documentation

Offensive Security Expert

For this organizational role we expect you to have the following knowledge:

  • information security

  • knowledge about common weaknesses of software and IT hardware, especially Common Vulnerability Enumerations (CWE)

  • knowledge about techniques, tactics and processes of advanced known vulnerabilities (CVEs) in IT systems, networks, and applications.

Your skills should include:

  • threat modelling

  • hands on hacking skills, including those tools

  • hands on experience with interactive application security testing tools (IAST)

  • hands on programming and scripting skills

  • writing reports

  • try harder mindset

PKI Engineer

For this organizational role we expect you to have the following knowledge:

  • information security

  • lifecycle of X.509v3 certificates

  • trust structures (chain of trust, trust hierarchies, et cetera)

Your skills should include:

  • system design thinking

  • hands on programming skills

Machine Learning Engineer

For this organizational role we expect you to have the following knowledge:

  • knowledge about information compression

  • model-based and utility-based agent learning 

  • back propagation, gradient descent, and algorithmic optimization

  • architecture types of artificial neural networks (KNN, DNN, RNN)

  • generative adversarial networks (GANs)

  • transformers

  • information security and ML-model hacking (optional, but great)

Your skills should include:

  • system design thinking

  • hands on programming skills with known frameworks (keras, pytorch, tensorflow) on GPGPUS

IAM Engineer

For this organizational role we expect you to have the following knowledge:

  • information security

  • lifecycle of users and their rights

  • lifecycle of organisational and technical roles

  • authentication and authorization

Your skills should include:

  • system design thinking

  • hands on programming skills

Software Security Engineer

For this organizational role we expect you to have the following knowledge:

  • information security

  • authentication and authorization

  • Secure Software Development Lifecycle

  • Software Maturity Models

  • modern and secure deployment processes (DevSecOps)

Your skills should include:

  • system design thinking

  • hands on programming skills, Full Stack

  • hands on experience with static and dynamic software security testing (SAST, DAST)