Four people who spent years running SOC operations before deciding to build the tooling they needed.
CEO & Co-Founder
Former SOC lead at a Virginia-based financial services firm where she managed a team of 11 analysts and responded to a Cobalt Strike intrusion that directly motivated ThreatPulsar's creation. Six years of threat hunting experience across financial services and critical infrastructure environments. Holds CISSP and GCIA certifications.
CTO & Co-Founder
Built the original parallel enrichment prototype that became ThreatPulsar's core engine. Previously a detection engineering lead at a federal contractor, where he developed SIEM correlation rules covering 14 ATT&CK tactics for a DoD network environment. Contributes to the open-source Sigma rule repository.
Head of Threat Research
Leads the team responsible for ATT&CK technique mapping accuracy and threat feed quality scoring. Previously a senior threat intelligence analyst at a global MSSP covering APAC and North American client environments. Published research on DGA detection methodologies used to inform ThreatPulsar's C2 beaconing engine.
Everyone on the team has worked in an operational security environment. Product decisions are grounded in what actually happens in a SOC during an active incident, not what looks good in a sales demo.
Four people. Seed stage. We're not hiring for headcount — we're hiring for specific capabilities the platform needs. If we add a role, it's because we've identified a clear gap in what we can build without it.
Located one mile from Rosslyn Metro. Proximity to the DC defense and intelligence community is a deliberate choice — our first customers and most of our product feedback come from that ecosystem.
We're a seed-stage company, which means equity is real and every role matters. If you've worked in detection engineering, threat intelligence, or SOC operations and want to build tooling instead of just using it — talk to us.
Get in Touch