Compass Security as an Employer

Compass stands for trust, competence, and customer orientation

The security industry is multi-faceted, exciting, and demands the highest level of continuous performance from our entire team. To support our customers' projects with skill, focus on requirements, and the highest quality, we need outstandingly talented and gifted IT specialists.

Find out here about the possible career opportunities for you at Compass Security.

Software Architect / Project Manager

Do you enjoy developing modern web applications? Do you have a flair for the organization and execution of computer science projects as well as for the provision of hacking competitions?

Experienced Security Analyst

Is our area of expertise your fascinating? Join us and share your knowledge and experience, develop your skills further and add your specialist knowledge to our team. 

 

Compass is currently offering the following open positions:

Beginner Security Analyst

You were probably not born a hacker. But you have gained in-depth knowledge from higher education or activity as a developer, system administrator or network specialist and - most importantly - you have a strong interest in information security. You attend conferences on the subject or you work actively in security related associations or projects.  

 

Compass is currently offering the following open positions:

Students

Term paper / Bachelor- or Master’s thesis collaboration

You are close to obtaining your Bachelor or Master's degree and it's time to write the final thesis. There are exciting subjects in information security waiting for someone to do some exact research in a bachelor or master’s thesis.

Contact us with a concrete proposal; maybe we can work together.

Internship

Depending on the number of internships already awarded and our current needs, we can offer you an internship. You must have completed the fourth semester at least, be a good autodidact and have a strong affinity for solving puzzles. You should have a marked interest in hacking, reverse engineering, or forensics and be able to show that you have some knowledge of this already, either from operating your own infrastructure, publishing vulnerabilities, or participating in related open source projects.

We will have a vacant internship again from 2020.

Send us your application with your resume and a cover letter to hr@compass-security.com

Apprenticeships

Compass security is not a classical software company; it is very highly specialized. We regret that it is not possible to offer computer science apprenticeships.

CALENDAR

New: Compass-Training "Internal Network and System Security" in Bern

In the 2-day seminar (in German) from February 11/12, 2020, you will get to know the most important basic concepts of IT security, attack tools and... Read more

KMU Swiss Forum 2020

The association «KMU Swiss» promotes the interaction between companies and specialists. He organises the annual KMU Swiss Forum. The next years motto... Read more

secIT 2020 – das IT Frühlings-Highlight in Hannover

Heise Medien lädt zur nächsten Veranstaltung der IT Security Branche ein. Im März 2020 öffnen die Tore der secIT zum dritten Mal. Wir sind vor Ort mit... Read more

ALL DATES

NEWS

Vulnerability in Apache Olingo OData 4.0

Compass analysts identified an XXE vulnerability in Apache Olingo OData 4.0. Read more

Vulnerability in totemodata

Fabio Poloni identified an XSS vulnerability in totemodata®. Read more

Gesundheitswesen: Ein leichtes Ziel für Hacker

«Heime & Spitäler» ist das Fachmedium für Entscheidungsträger von Schweizer Heimen und Spitäler. In der aktuellen Ausgabe beschreibt Compass Security... Read more

ARCHIVES

Compass Security Blog

Finding Active Directory attack paths using BloodHound

As a defender, you want to find and patch attack paths in your Active Directory environment. One cannot easily spot issues by looking at the Active Directory Users and Computers console, GPOs, etc.... mehr

Challenging Your Forensic Readiness with an Application-Level Ransomware Attack

Ransomware focuses on encrypting data on a filesystem-level, either locally on infected client systems or remotely on accessible file servers. However, what if ransomware would start encrypting data... mehr

ZUM BLOG