For Security Professionals
Set what you want. We only contact you when something fits. Your name stays hidden until you say otherwise.
5 minutes. Tell us what matters — minimum salary, role type, company stage, location, problem domains. No CV required. No phone call. You're in control from the start.
Before we match anyone, we qualify the brief with the company. Budget confirmed. Problem defined. Hiring manager committed. If the role isn't real, you never hear about it.
A recruiter who's placed 300+ security professionals reviews the match from both sides. They may reach out for a short conversation to understand context — but only after you've already set your terms.
You receive a brief — the role, the salary, the problem, the team. You decide whether to engage. Your identity stays anonymous until you choose to reveal it.
Role
Head of Detection Engineering
Compensation
$280k - $340k + equity
Stage
Series B · 120 eng
Location
Remote AU · Hybrid OK
Match Score
The Problem
Building detection-as-code from zero. Current stack is legacy SIEM with 2,000+ rules, 80% noise. Need someone who has built a modern detection pipeline and can lead a team of engineers. CISO reports to CTO, eng-first culture.
Why Trinity Matched You
Built detection-as-code pipeline at previous role
Sigma rule authoring experience matches stated preference
Compensation within your stated range
Request access to see full briefs
What you receive
Role
Head of Detection Engineering
Compensation
$280k - $340k + equity
Stage
Series B · 120 eng
Location
Remote AU · Hybrid OK
Match Score
The Problem
Building detection-as-code from zero. Current stack is legacy SIEM with 2,000+ rules, 80% noise. Need someone who has built a modern detection pipeline and can lead a team of engineers. CISO reports to CTO, eng-first culture.
Why Trinity Matched You
Built detection-as-code pipeline at previous role
Sigma rule authoring experience matches stated preference
Compensation within your stated range
Request access to see full briefs
What you won't get
InMails about roles that have nothing to do with security
Recruiters who can't tell the difference between AppSec and GRC
Your details shared without your permission
Pressure to apply for something that doesn't match your preferences
Silence after you've invested time — if we reach out, there's a real brief behind it