Bishop Fox

Bishop Fox

Senior Exploit Developer

US | $116K - $207K

Apply for job

Company information

Bishop Fox is recognized as the leading authority in offensive security, providing solutions ranging from continuous penetration testing, red teaming, and attack surface management to product, cloud, and application security assessments. Enterprises have been told that breaches are inevitable. But we don’t accept that. We focus on offensive security because we believe securing modern organizations requires a "forward defense" approach that proactively uncovers and eliminates exposures before they are exploited. Over the past 16 years, we’ve worked with more than 25% of the Fortune 100, 8 of the top 10 global tech companies, and hundreds of other organizations to improve their security. Our award-winning Cosmos platform was named Best Emerging Technology in the 2021 SC Media Awards and our offerings are consistently ranked as “world class” in customer experience surveys. Security isn’t just a job to us. We do this because we love it — and because we're committed to the common good. In fact, we have authored 15 open-source tools, shared groundbreaking research, and published more than 50 security advisories in the last 5 years. Learn more about us at or follow us on Twitter @bishopfox for the latest updates.

Linkedin Icon
201-500 employees
Software, Information Technology, Financial Services, Consulting, Cybersecurity, Computer Software, Information Technology and Services, Computer Networking, Information Technology & Services, Management Consulting
Privately Held
Founded: 2005
Last round: Series B
Last round: US$ 46.0M
Tempe, Arizona
Company Specialties:
Computer Security, Risk Assessment, Pentesting, Information Security, Architecture Security, Penetration Testing, Network Security, Application Security, Red Teaming, Continuous Penetration Testing, Mobile Security, Cybersecurity, Physical Penetration Testing, Application Assessment, Product Security Review, Mobile Application Assessment, Attack Surface Testing, Social Engineering, External Penetration Testing, Internal Penetration Testing, Cloud Security, Attack Surface Management, and Threat Modeling