Interested in being a part of our innovative team of cybersecurity professionals?

Sensato is a team-oriented organization,  inspired by military special operations. Our members are passionate about their mission and wholly dedicated to securing information.

At Sensato, we pride ourselves in our team's ability to think differently, act tactfully, and remain vigilant.  Our tactical approach to cybersecurity allows us to provide revolutionary solutions, and the goal of our team is to think and act as influential and innovative as our cyber solutions.

Good to Know

  • Secret clearances desirable
  • You must pass an on-going criminal and financial history investigation
  • You must have verifiable stellar references
  • We are a drug/smoke/alcohol free organization

About You

  • You love to learn, explore, and innovate
  • You have amazing attention to detail
  • You can lead and follow
  • You have extraordinary listening and assimilation skills
  • You overcome fear through perseverance
  • You can present technical topics without complexity
  • You are extraordinarily passionate and skilled in your chosen profession
  • You maintain your cool during extreme chaos

About Sensato

  • Located in Red Bank, NJ
  • Named one of the Top 500 Most Innovative Cybersecurity Companies in the world
  • We demand Honor and Integrity

Current Opportunities

Cybersecurity Analyst 
Experienced cybersecurity engineer/analyst with direct hands-on experience.  Knowledge or experience with penetration testing, threat intelligence, cyber-warfare highly desirable.

Business Development Manager
You should have a proven and successful sales, marketing, account management and technical background. You must have an understanding of cybersecurity.  Healthcare technology background is a plus.

Cybersecurity Engineer 
Strong background in advanced threat analysis and attack response. Strong programming experience with an emphasis on SQL, Regular Expressions, Python, C# and related technologies. Experience with penetration testing tools and procedures to include social engineering, software and hardware attacks and APT.