Careers at Karen IT

Work on Problems
That Actually Matter.

We investigate cybercrime, build threat intelligence infrastructure, and protect organizations from digital threats. If you want to do work that has real-world consequences — we're hiring.

Global Remote-friendly
3 Office locations
Real Impact from day one
banner-career-1.png
Why Karen IT

We're a small team
doing serious work.

Karen IT is not a large corporation. We're a focused team of security professionals, investigators, and engineers — based in Abu Dhabi and Dubai, with a growing European presence — working on threat intelligence, cybercrime investigation, and internet safety infrastructure that's used by organizations and DNS resolvers worldwide.


When you join Karen IT, you're not joining a department. You're joining a team where your work is directly visible, where the problems are real, and where what you build actually gets used.

🌍

Remote-Friendly

We work across time zones and locations. Offices in Abu Dhabi and Dubai — fully remote roles also available depending on the position.

🎯

Real Impact

Our threat feeds are used by Quad9. Our takedowns protect real organizations. Our investigations shut down real campaigns. This is not sandbox work.

📈

Room to Grow

We're growing across threat intelligence, investigation, and engineering. Early team members have the most opportunity to shape what we build next.

🔬

Deep Technical Work

From malware analysis to DNS infrastructure to cyber investigation — we work on problems that require genuine expertise, not surface-level tools.

🌐

Global Reach

We work with registrars, registries, hosting providers, and security organizations across the world. Your work has reach beyond what most security teams see.

⚖️

No Corporate Nonsense

No layers of approval for every decision. No performative process. You'll know why you're doing what you're doing — and so will the rest of the team.

What We Look For

We hire for skill,
curiosity, and
integrity.

We don't have a rigid profile for every role. What matters to us is consistent across the team — regardless of the specific position.


🔍

Intellectual Curiosity

You go deeper than the surface. When something doesn't make sense, you want to understand why — not just move on.

Ownership Mentality

You don't wait to be told what to do next. You identify what needs doing and you do it — then you communicate clearly about it.

🛡️

Ethical Commitment

We work with sensitive intelligence and critical infrastructure. Integrity is non-negotiable. We need people who understand why that matters.

🔗

Collaborative by Default

We're a small team. Everyone's work touches everyone else's. We need people who communicate proactively and share knowledge freely.

📐

Rigorous Thinking

Whether you're writing a forensic report, building an API, or drafting an investigation summary — precision and clarity matter here.

🌐

Global Awareness

Cybercrime doesn't respect borders. We work across jurisdictions, languages, and cultures. Broad perspective is a genuine asset.

Our Values

What guides how
we work.

These aren't aspirational statements. They're the things we actually try to hold ourselves to, every day.

01

Truth Over Comfort

We say what we actually think — to each other, to clients, and in our reports. If the evidence doesn't support a conclusion, we say so. No performance, no spin.

02

Precision Matters

In threat intelligence, in forensics, in investigation — imprecision has consequences. We care about getting things right, not just getting things done.

03

Defenders First

Everything we build and everything we do is oriented toward the same goal: making it harder to run cybercrime operations and easier to get caught.

04

No Hidden Agendas

We're direct with each other. Disagreements happen in the open. Decisions get explained. We don't do politics or passive-aggressive behavior.

05

Earn Trust Continuously

We work with registrars, registries, and organizations that depend on us to be reliable. Trust is built through consistent, documented, honest work.

06

Stay Curious

Threat actors evolve. The internet changes. We can't stop learning. The best people here are the ones who are genuinely interested in understanding how things work.

How We Hire

No mystery. No nonsense.
Here's how it works.

01

Apply

Send your CV and a short note about why this role and why Karen IT. No cover letter templates — just tell us something real.

02

Intro Call

A 30-minute conversation with someone from the team. We'll tell you what we actually do. You tell us what you've actually worked on.

03

Technical Review

Depending on the role — a task, a case study, or a deeper conversation about your area of expertise. We keep it relevant and reasonable.

04

Decision

We move fast. We'll give you honest feedback regardless of the outcome. No ghosting.

Open Positions

Current Openings.

We're a small team, so every hire matters. These are the roles we're actively looking to fill right now.

Career Opportunities

Explore our open roles for working totally remotely, from the
office or somewhere in between.

Don't See the Right Role?
Reach Out Anyway.

If you think you'd be a good fit for what we do but don't see an exact match, send us your CV with a note about what you'd want to work on. We're always interested in strong people.