Do Work That Matters and Makes an Impact

Why Leviathan?

We value people

This isn’t a platitude, it’s a core principle. Leviathan will never claim ownership of your personal IP. Your personal projects, research, products, and tools you create on your own time are yours. This is codified in our employment agreement. We also provide annual 401(K) contributions. We’re serious about sharing in Leviathan’s success. All employees receive an equity package in the company as part of their total compensation.


We respect work-life balance

You are never expected to work beyond your 40-hour work week. We value mental health and family time. Our flexible work hours and PTO plan encourages time off. We respect the difference between work and personal life.

We invest in you

We provide our people ongoing resources and training (ask us about our internal SOS & Brown Bag Talks).

We allocate work hours to professional development, including research projects, presentations, and tool creation. We pay for certifications and specialized training to enhance your abilities.

We are community driven

We are deeply embedded in security and have teammates who work, volunteer, and support Bsides, Toorcon, Defcon, and more. Our team participates in community driven problem solving, open source projects, and a range of non-profits.

We are a team who cares profoundly about supporting the cyber security community.

Growth Mindset

Never feel stagnant with your work again

Our people have a learning-first mentality with internal growth opportunities, educational series, mentorship, and more. The knowledge and experience you gain from our internal training cannot be found in any certification course. We cultivate a culture of discovery and innovation by sharing internally to create a cohesive learning environment . You learn something new everyday.

Technical Leadership

Leadership that actually understands your work. Report to true practitioners. We have technical leadership- from our founder to our team leads. We know the effort and complexity that goes into your everyday work.

Enhance your career by working with your team lead, who is a cybersecurity master. Not only will they be managing you, but they will be educating and supporting you as you grow within your position.

Located in stunning Seattle

Work Remote

While we are headquartered in Seattle, WA, our consultants enjoy the benefits of working remotely anywhere in the U.S. and Europe while doing meaningful and impactful work.

Open Positions

Leviathan Security works with all the top technology companies in the world to solve the most complex security challenges.

Remote, Seattle, Washington, United States

Senior Security Consultant

We are actively seeking out senior-level security consultants focusing on advanced penetration testing experience. We would love to talk with you about taking on penetration testing projects for some of the world's biggest and most important companies. While our primary need right now is Mobile Application Penetration Testing, as a Senior Level Security Consultant, you will also be called upon to perform advanced penetration tests in other areas we specialize in, like Hardware Security, Web App Security, Network Security, and Wireless Security & Cloud Security.

Remote, Seattle, Washington, United States

Senior Systems Administrator

We seek a Senior Systems Administrator with a robust orientation toward performance-driven outcomes. This role is pivotal in leveraging technology to enhance business processes effectively and address IT support challenges. The position requires managing a dynamic workload, 60% of which is dedicated to IT project initiatives and 40% to advanced user support. Success in this role is defined by your ability to transform technical challenges into opportunities for learning, business improvement, and strategic impact. 

Remote, Seattle, Washington, United States

Hardware Penetration Tester

Step into a Hardware Penetration Tester role with us, where you'll spearhead penetration testing and in-depth technical assessments for hardware and embedded systems. Your expertise will be crucial in identifying vulnerabilities, offering actionable remediation steps, and conveying the business impact to a diverse audience. While your core responsibility lies in hardware security, the role extends to other penetration testing facets, including web, network, cloud, and mobile platforms.