General Description

Lumu Technologies is seeking a talented  threat intelligence consultant with previous experience as a penetration tester to join the delivery and presales organization of the company illuminating threats, attacks and adversaries.

LUMU is a cybersecurity company that builds products and services that accurately assess the level of compromise of an organization by illuminating the threats, attacks and adversaries they are facing in real-time. Enterprises have invested millions of dollars in cyber-defense infrastructure, yet the number of breaches disclosed every day demonstrates that security in going in the wrong direction. Help us end the breach dark days joining Team LUMU where you will help customers implement the innovative concept: “Assume you’re compromised and prove otherwise.”

In this role, you will lead the delivery of our LUMU OnDemand offering which aims to assess the level of compromise from an organization by assessing metadata from the network such as: DNS queries, network flows, proxies and firewall access logs, and spambox.


  • Participate in security assessments of networks, systems and applications.
  • Implement Lumu’s innovative concept: “Assume you’re compromised and prove otherwise” in every customer engagement.
  • Execute delivery work that exceeds expectations
  • Understand the client’s business and needs.
  • Develop and maintain positive relationships with clients.
  • Participate in industry conferences and professional organizations.
  • Creating additional value for clients through continual insights and consultative advice based on experience with the client, their industry, established standards and leading practices.
  • Partner with sales to articulate and demonstrate LUMU’s products and services to prospects and customers.
  • Collaborate with leaders throughout the organization to evolve LUMU’s products and services.
  • Must have the ability to travel up to 50% of time

Required Skills and Experience

  • BS/MS in Information Security (or equivalent experience). Outstanding candidates with less experience will also be considered.
  • Prior operational experience leveraging threat intelligence to detect and respond to adversaries.
  • A strong understanding of the current threat landscape including the latest tactics, tools, and procedures, common malware variants, and effective techniques for detecting this malicious activity.
  • Modern penetration testing tools and methods.
  • Knowledge of security principles, techniques, and technologies.
  • Good understanding of network protocols, design, and operations.
  • Team-oriented, possess a positive attitude and works well with others.
  • Outstanding communication skills, both written and oral.
  • The ideal candidate should have a clear understanding of cyber-attacks and passion to build software that identifies, stop and prevent those attacks.
  • CISSP, CISA, CEH, OSCP or other information security certifications will be a plus.

Apply by sending your resume to: