<aside> 👋🏽

As a candidate, it can be surprisingly difficult to learn what the job you’re applying for actually entails! I hope the detail we’ve put into this job posting helps you get some clarity about our company, product, team, and the role. – Sumeet Jain, Head of Engineering

</aside>

➡️  Overview | The Role | “A week in the life” | Compensation | The Company | Interview Process

Overview

What We Do

<aside>

If you haven’t already, check out https://sublime.security/. What follows is a slightly more technical description.

</aside>

Our flagship product is a message processing pipeline that runs detection rules written in MQL — "Message Query Language", our first-party DSL for querying email messages. This core function protects organizations from phishing. The Sublime Security platform monitors and analyzes all incoming email for an organization's employees, flagging suspicious messages for the security team to triage.

Here’s a conceptual view of how a rule is processed and what a flagged message looks like in our UI:

8e6858b6-45f4-4d06-ac8f-58cf0d5b3eae.png

mdv.png

Behind MQL for writing detection rules are ML classification models, external services, functions like WHOIS lookup, headless browsing, and more.

Our systems handle large datasets and perform inherently complex and resource-intensive operations. However, our core competency—detecting and remediating attacks—requires extremely low latency. As a result, we have very little tolerance for performance degradation.

We can host a customer’s Sublime instance, or they can deploy our entire product stack on their own infra via AWS CloudFormation on ECS or Azure Resource Manager on Kubernetes via AKS. This diversity of deployment type adds some complexity to our development lifecycle. Our goal is to consolidate our infrastructure setup to make it easy for users to deploy Sublime in any environment.

Why is this important?

Phishing is a means by which an attacker gains access to something they shouldn’t have access to. Think about what inappropriate access could mean to your past employers, your state government, or to non-profit organizations you care about. The impact from real phishing attacks includes:


What you’re signing up for