Full-Time

Senior Software Engineer

runZero

runZero

51-200 employees

Network discovery and asset inventory platform

Compensation Overview

$160k - $190k/yr

+ Stock options

Remote in USA + 1 more

More locations: Remote in UK

Remote

U.S. or U.K. residency required.

Category
Software Engineering (1)
Required Skills
Microsoft Azure
Git
Data Structures & Algorithms
SQL
Postgres
RDBMS
AWS
Go
Vue.js
REST APIs
Linux/Unix
Google Cloud Platform
Requirements
  • You are proficient at writing advanced Go and working with large Go codebases
  • Experience with other parts of our stack (PostgreSQL, Linux, Vue.js) is strongly preferred, but deep experience with related technologies and a desire to learn can work for the right candidate
  • Experience designing and implementing RESTful APIs, writing and tuning SQL queries, and working with relational databases
  • Experience designing and optimizing data structures / schemas and indexes in relational databases
  • Thorough understanding of the responsibilities of the platform, database, API, caching layer and other web services used in modern software systems
  • Proficiency with standard development tools and paradigms (Git, GitHub, CI/CD, etc.)
  • Proactive approach to problem-solving with strong decision-making skills
  • Knowledge of approaches for testing, debugging, profiling, and optimizing software applications
  • Solid understanding of the HTTP protocol and the web browser security model
  • Experience working within one of the major cloud provider environments (AWS preferred, GCP, Azure)
  • Familiarity with network design, security, and scanning can be helpful but is in no way required to be successful
Responsibilities
  • Develop and maintain high-quality, performant web applications using Go, Vue.js, and other technologies
  • Build features and solve problems that frequently span front-end and back-end concerns
  • Collaborate closely with product management, design, frontend, and backend engineers to understand customer needs and translate them into product features
  • Participate in code reviews, providing constructive feedback to team members
  • Conduct thorough testing and debugging to ensure the performance and quality of both front-end and back-end code
  • Contribute to the continuous improvement of our products, technology, and practices with a pride of ownership
  • Stay up-to-date with the latest trends and best practices in front-end, back-end, and architectural development
  • Excellent communication and teamwork skills

runZero provides network discovery and asset inventory tools that help organizations map all devices and assets across IT, OT, and cloud environments. The product works as a subscription-based software platform that continuously scans networks to identify devices, both managed and unmanaged, and inventories them with context for security and IT operations. Clients access different tiers of service, including basic asset discovery, advanced reporting, and integrations with other security tools, with pricing based on network size and asset count. runZero differentiates itself by delivering accurate, up-to-date asset data across diverse environments and by targeting a wide range of customers—large enterprises, MSPs, and government—while focusing on incident response and rapid decision-making. Its goal is to provide complete visibility of every asset in a network to improve cybersecurity and operational efficiency.

Company Size

51-200

Company Stage

Series A

Total Funding

$20M

Headquarters

Austin, Texas

Founded

2018

Simplify Jobs

Simplify's Take

What believers are saying

  • Subscription model scales revenue with client network growth across enterprises.
  • Partnerships with Aqaio, AmiViz expand into Europe and Middle East markets.
  • Decibel.vc investment fuels rapid growth in cloud and physical asset discovery.

What critics are saying

  • CrowdStrike Falcon CAASM bundles cause 20-30% enterprise customer churn now.
  • Microsoft Defender bundling captures government clients within 3-9 months.
  • Tenable One's 40% larger share forces runZero into low-end subscriptions.

What makes runZero unique

  • runZero uses agentless active scanning for fragile OT devices without credentials.
  • HD Moore, Metasploit creator, founded runZero in 2018 for complete asset visibility.
  • CAASM platform discovers IPv6, multi-homed bridges missed by passive tools.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Health Insurance

Dental Insurance

Vision Insurance

Life Insurance

Disability Insurance

401(k) Company Match

Unlimited Paid Time Off

Stock Options

Growth & Insights and Company News

Headcount

6 month growth

-2%

1 year growth

5%

2 year growth

5%
runZero
Mar 3rd, 2026
The network you think you have isn't the one you actually have

The network you think you have isn't the one you actually have. Updated March 3, 2026, 8:00am EST At the SANS Winter Cyber Solutions Fest 2026: Utilities and Critical Infrastructure event, runZero CEO HD Moore's presentation proposed a simple but uncomfortable premise: the air gap is dead, and the illusion of segmentation is very much alive. Attackers exploit edge device zero-days, abuse forgotten cellular backup links, and pivot through multi-homed systems that quietly route around every control you've deployed. The tools most teams rely on, including passive monitoring, vulnerability scanners, and OEM software, consistently miss the exposure paths that matter most. In his presentation, Segmentation Theater, HD breaks down how to address these gaps. Below, runZero, Inc. has highlighted several key failure modes and what you can do about them. The thing protecting your OT environment is also the thing attackers walk through first. Firewalls are the load-bearing wall of OT segmentation. They show up at every Purdue level, and they work...right up until they don't. Mandiant looked back at a full year of OT incident response and found that roughly 30% of those incidents started with initial access through a perimeter security device. Palo Alto, Ivanti, Fortinet, the products runZero, Inc. has spent years deploying to protect these environments, were the top three compromised entry points. The attackers aren't looking for some exotic OT-specific exploit. They're using a Fortinet zero-day and walking right in. The structural problem here is that when you deploy a single firewall vendor from your enterprise zone all the way down to Level 2, you haven't built defense in depth, you've built a single control that spans everything. An authentication bypass at the top collapses the whole stack. Layering vendors helps, but it doesn't solve the underlying issue, which is that firewalls have become both the most critical and the most attacked component in OT networks simultaneously. They need to be treated like assets you actively monitor, not infrastructure you set and forget. Your devices are routing between zones you're trying to keep separate. A device that has two network connections, a wired OT segment and guest Wi-Fi for example, can route traffic between them without a single packet ever touching your firewall. No alert. No log entry. Just quiet, invisible bridging. runZero, Inc. did research on how many devices have IP forwarding enabled by default and the honest answer is: most of them, including printers, smart TVs, and ESP32-based IoT hardware. runZero, Inc. had a harder time finding devices that didn't have it on than ones that did. The situation gets worse when developers install tools like Docker on workstations that sit on OT-adjacent segments. Docker enables IP forwarding across all interfaces as a side effect of its virtual networking. The developer doesn't know they've just turned their workstation into a multi-interface router. Nobody told them that was a firewall configuration problem they now own. At scale, these unintended connections compound fast. In a network of 30 devices the path graph is already messy. In an enterprise with thousands of employees and dozens of OT sites, you've effectively got one big hairball where any point can reach any other in a hop or two. The least-secure thing on your network is often the thing managing everything else. Serial console servers, KVM-over-IP switches, and IPMI interfaces are everywhere in OT environments. They exist because you need a way to get remote access to hardware that can't otherwise be managed remotely. They're also consistently the worst-secured devices in the building. Across MOXA, Digi, Pi KVM, SuperMicro IPMI, runZero has found unauthenticated session access, insecure proprietary protocols, and hardcoded credentials. These are consumer-grade bugs sitting directly in front of hardened industrial equipment. SuperMicro IPMI is a good example of how slowly this problem moves. California passed a law requiring device manufacturers to ship with unique passwords instead of hardcoded defaults. SuperMicro now ships with a password derived from your device serial number. Progress. They also still ship with IPMI and RAKP enabled by default, which is enough for an attacker to dump and crack credentials remotely without any exploitation at all. The attacker doesn't need to go after your hardened server. They go after the KVM attached to its serial port, and they're in. IPv6 is already on your network & you're probably not watching it. A quick count on a modern laptop turns up 28 active network interfaces, the majority of them IPv6. This is normal. What's not normal is that most teams are only writing firewall rules for IPv4. A device with solid IPv4 filtering and no equivalent IPv6 rules may be exposing databases, fileshares, and credential stores to anyone on the same subnet through its IPv6 address, an address nobody is scanning for, and that doesn't show up in any normal monitoring. Recently, a customer using runZero was flagged for having a device with a public IP. The customer looked at it and said, that's impossible and that they knew every public IP on this network. It was a packet capture server which was supposed to be completely internal. It had a global IPv6 address assigned by the upstream ISP router that nobody had ever noticed. The device was globally reachable in a way the customer had no visibility into whatsoever. This is not an unusual story. Shodan has indexed over 200 million IPv6 addresses, partly by running NTP servers that quietly log the source address of anything that syncs to them. Your OT devices might already be in there. So what can you do? It goes beyond monitoring. Passive monitoring alone won't catch any of this. Span port captures don't see traffic that bypasses your choke points. They don't find multi-homed devices. They don't surface link-local IPv6 paths. Vulnerability scanners will tell you whether your firmware is out of date but they won't tell you whether your network is bridged in ways it shouldn't be. This is the problem runZero was built to solve. runZero, Inc. use safe, active scanning designed specifically for fragile OT environments to query devices and have them report back everything: all interfaces, all IP addresses, IPv4 and IPv6, secondary NICs, VPN adapters, cellular connections. runZero, Inc. cross-reference internal fingerprints against its internet-wide scan data so you can find out if something internal is externally reachable without having to start from the internet side. runZero, Inc. find the bridges, the unexpected management interfaces, the IPv6 exposure, the out-of-band hardware that's been forgotten in a rack somewhere. The point isn't that these problems are unfixable. It's that you can't fix what you can't see. The first step is knowing what's actually on your network, not the diagram version, the real one. Book a demo to see how runZero can help in your environment, or begin your free trial here. Great research and development is a team effort! Multiple runZero team members collaborated on this post. Go team! See results in minutes. See & secure your total attack surface. Even the unknowns & unmanageable.

Business Wire
Jul 24th, 2025
runZero Accelerates European Growth Through Strategic Partnership with Aqaio

runZero accelerates European growth through strategic partnership with Aqaio.

EIN News
Aug 27th, 2024
AmiViz partners with runZero to deliver enhanced cybersecurity visibility across networks

DUBAI, UNITED ARAB EMIRATES, August 27, 2024 / EINPresswire.com / - AmiViz, the leading cybersecurity-focused value-added distributor headquartered in the Middle East, is proud to announce its strategic partnership with runZero.

Dark Reading
May 8th, 2024
runZero Research Explores Unexpected Exposures in Enterprise Infrastructure

SAN FRANCISCO, CA - May 7, 2024 - At the RSA Conference today, runZero announced the inaugural edition of the runZero Research Report, the first in a series of publications that explore the state of asset security across global enterprises.

Business Wire
May 7th, 2024
Runzero Research Explores Unexpected Exposures In Enterprise Infrastructure

SAN FRANCISCO--(BUSINESS WIRE)--At the RSA Conference today, runZero announced the inaugural edition of the runZero Research Report, the first in a series of publications that explore the state of asset security across global enterprises. As a leading provider of Cyber Asset Attack Surface Management (CAASM), this report leverages runZero’s unique perspective across hundreds of enterprise networks, including internal infrastructure, internet-facing assets, and cloud environments.“Our research reveals alarming gaps and unexpected trends in enterprise infrastructure, including the decay of network segmentation, persistent challenges in attack surface management, and the increasing volume of dark matter on modern networks,” said HD Moore, founder and CEO. “runZero was built on the principle that applied research makes for better asset discovery, and that better asset discovery is the foundation of the modern exposure management organizations need to successfully defend against these challenges.”Key findings include:IT and OT are converging, increasing the attack surface of organizations and requiring new techniques to discover and manage assets. OT systems are high-value targets for attackers and are consistently exposed to untrusted networks. Over 7% of the ICS assets sampled are exposed to the public internet. These assets include programmable logic controllers, power meters, and protocol gateways, all of which play an important role in critical infrastructure.OT systems are high-value targets for attackers and are consistently exposed to untrusted networks