Compass Security as an Employer

Compass stands for trust, competence, and customer orientation

The security industry is multi-faceted, exciting, and demands the highest level of continuous performance from our entire team. To support our customers' projects with skill, focus on requirements, and the highest quality, we need outstandingly talented and gifted IT specialists.

Find out here about the possible career opportunities for you at Compass Security.

Software Architect / Project Manager

Do you enjoy developing modern web applications? Do you have a flair for the organization and execution of computer science projects as well as for the provision of hacking competitions?

Experienced Security Analyst

Is our area of expertise your fascinating? Join us and share your knowledge and experience, develop your skills further and add your specialist knowledge to our team. 

 

Compass is currently offering the following open positions:

Beginner Security Analyst

You were probably not born a hacker. But you have gained in-depth knowledge from higher education or activity as a developer, system administrator or network specialist and - most importantly - you have a strong interest in information security. You attend conferences on the subject or you work actively in security related associations or projects.  

 

Compass is currently offering the following open positions:

Students

Term paper / Bachelor- or Master’s thesis collaboration

You are close to obtaining your Bachelor or Master's degree and it's time to write the final thesis. There are exciting subjects in information security waiting for someone to do some exact research in a bachelor or master’s thesis.

Contact us with a concrete proposal; maybe we can work together.

Internship

Depending on the number of internships already awarded and our current needs, we can offer you an internship. You must have completed the fourth semester at least, be a good autodidact and have a strong affinity for solving puzzles. You should have a marked interest in hacking, reverse engineering, or forensics and be able to show that you have some knowledge of this already, either from operating your own infrastructure, publishing vulnerabilities, or participating in related open source projects.

We will have a vacant internship again from 2020.

Send us your application with your resume and a cover letter to hr@compass-security.com

Apprenticeships

Compass security is not a classical software company; it is very highly specialized. We regret that it is not possible to offer computer science apprenticeships.

CALENDAR

Securing Industrial IoT

On August 29, 2019, experts from research and practice will meet in Bremen to discuss how industry companies and CIP operators can actively protect... Read more

Beer-Talk #20 in Berlin: Keep Calm and Dump Your Memory

Cybercriminals are constantly finding sophisticated ways to infect computers or mobile devices with malware. What you should NOT do (and why) if your... Read more

Cyber Risks – from abstract risk to everyday reality

The Europa Institut at the University of Zurich (EIZ) is one of the leading centres of expertise for European Law and is an important provider of... Read more

ALL DATES

NEWS

Vulnerability in "The Scheduler" Plugin for Jira

Thierry Viaccoz has identified an XML External Entity (XXE) vulnerability in "The Scheduler" plugin for Jira. Read more

Vulnerability in the Email+ iOS Application from MobileIron

Sylvain Heiniger has identified a "Cleartext Storage of Sensitive Information" vulnerability in the MobileIron application Email+. Read more

Vulnerabilities in Universal Automation Center (UAC)

Michael Fisler and Felix Aeppli have identified vulnerabilities in the Universal Automation Center (UAC). Read more

ARCHIVES

Compass Security Blog

Privilege escalation in Windows Domains (2/3)

This second article about privilege escalation in Windows domains describes how to propagate by aiming for passwords that are lying around. mehr

Privilege escalation in Windows Domains (1/3)

This first article of our series about privilege escalation in Windows domains demonstrates how to get a foothold by relaying credentials from users. mehr

ZUM BLOG