Key Takeaways
- Adaptive Security is a Series A, a16z-backed AI-native cybersecurity startup focused on deepfake, voice-clone, and GenAI social engineering defense — not a legacy phishing simulation vendor.
- The 43 million dollar Series A (April 2025) implies roughly 18 to 24 months of runway. Hiring pace is high, expectations are high, and compensation is equity-heavy.
- CEO Brian Long is a two-time successful founder (Attentive, TapCommerce). His execution track record is a major asset and also a concentrated dependency — an honest risk to name.
- The ATS is Ashby at jobs.ashbyhq.com/adaptive. Apply there directly with a clean PDF, a specific cover note, and real outcomes on the resume.
- Interviews favor directness, specificity, and real-world problem solving. Generic behavioral scripts and vague outcomes do not land. Founders interview most hires at this stage.
- The category is crowded (KnowBe4, Proofpoint, Hoxhunt, Abnormal, Doppel, Reality Defender, Pindrop, and others). Adaptive's wedge is AI-native design; the main risk is a legacy incumbent shipping a credible AI-native product faster than expected.
- Strong signals: ownership, written communication, genuine curiosity about adversaries, comfort with ambiguity, and a realistic understanding of early-stage risk and equity.
- Offers are negotiable. Ask for equity percentage, 409A valuation, vesting schedule, and acceleration terms — not just total share count — to evaluate the real economics.
About Adaptivesecurity
Application Process
-
1
Adaptive Security uses Ashby as the applicant tracking system
Adaptive Security uses Ashby as the applicant tracking system. The public job board lives at jobs.ashbyhq.com/adaptive and lists every open role. Apply there rather than on third-party job aggregators so your application lands directly in the hiring pipeline without recruiter attribution noise.
-
2
Submit a focused resume (ideally one page for under ten years of experience, two
Submit a focused resume (ideally one page for under ten years of experience, two pages maximum) tailored to the specific job posting. Ashby parses cleanly from PDF, so you do not need an ATS-gaming keyword dump. Human screeners read every resume at a company this small.
-
3
A short cover note inside the Ashby application is worth writing
A short cover note inside the Ashby application is worth writing. Three to five sentences that explain why you care about AI-enabled social engineering defense specifically — not generic cybersecurity interest — will move you ahead of boilerplate applicants. Mention a deepfake or voice-clone incident you followed if it is honest.
-
4
The recruiter screen is typically 20 to 30 minutes with a talent partner or the
The recruiter screen is typically 20 to 30 minutes with a talent partner or the hiring manager directly. Expect questions about your motivation for early-stage work, your comfort with ambiguity, and a light technical or domain screen. Be ready to articulate a point of view on why AI-attacker tooling changes the security awareness category.
-
5
Technical roles (engineering, ML, research) usually include a take-home or live
Technical roles (engineering, ML, research) usually include a take-home or live coding exercise, followed by a systems design or ML design round. Security-focused roles may involve a threat-modeling or attack-simulation design discussion. GTM roles (sales, customer success, marketing) involve a scenario or mock pitch round tailored to a security buyer persona.
-
6
Expect to meet Brian Long (CEO) or Andrew Jones (CTO) at some stage in the proce
Expect to meet Brian Long (CEO) or Andrew Jones (CTO) at some stage in the process. At a company this size, founders interview every hire. Prepare thoughtful questions about the 18-to-24-month roadmap, target ICP, and how the company plans to defend against legacy incumbents re-platforming on GenAI.
-
7
A values or culture conversation is common
A values or culture conversation is common. Adaptive-style startups screen hard for judgment, urgency, and what is often called low-ego high-bar behavior. Concrete stories about disagreement, recovery from failure, and peer feedback tend to outperform rehearsed answers.
-
8
References are usually checked before an offer
References are usually checked before an offer. Line up two or three managers or peers who can speak to specific outcomes you drove, not generic testimonials. Former colleagues who can describe how you behaved in ambiguity are most valuable.
-
9
Offers are typically extended verbally first, then in writing via Ashby or DocuS
Offers are typically extended verbally first, then in writing via Ashby or DocuSign. Negotiation is expected and does not hurt your standing. Ask for the equity percentage (not just share count), the 409A valuation, the vesting schedule, and any acceleration provisions. Series A equity is meaningful only if you understand dilution through Series B and C.
-
10
Timeline from application to offer is typically two to four weeks when the proce
Timeline from application to offer is typically two to four weeks when the process moves cleanly. Delays of a week or two between rounds are normal at a company hiring across many roles at once and are not usually a negative signal.
Resume Tips for Adaptivesecurity
Lead with a short professional summary (two or three lines) that names the categ
Lead with a short professional summary (two or three lines) that names the category you work in and the outcome you are known for. Generic summaries get skimmed past at a company reading hundreds of applications per role.
Quantify impact
Quantify impact. For engineering: latency reduced, throughput improved, incident count reduced, cost per query cut. For GTM: pipeline sourced, ACV closed, retention rate, cycle time. Numbers tell the Adaptive team you think in outcomes, not activity.
If you have cybersecurity, fraud, trust and safety, threat intelligence, or secu
If you have cybersecurity, fraud, trust and safety, threat intelligence, or security awareness experience, surface it in the top third of the resume. Even adjacent experience (abuse tooling, account takeover defense, anti-phishing at a large consumer platform) maps directly to what Adaptive does.
For ML and AI engineering roles, call out concrete work with LLMs, voice synthes
For ML and AI engineering roles, call out concrete work with LLMs, voice synthesis, speech models, or generative systems. Adaptive is hiring people who can reason about both sides of the attacker-defender loop in GenAI.
Name specific technologies
Name specific technologies. For backend roles this usually means Python, TypeScript, Go, AWS or GCP, Postgres, Kafka or similar. For ML: PyTorch, transformers, vector stores, LangChain or equivalent orchestration, evaluation frameworks. Vague tech lists read as inexperience.
Call out any experience with Ashby, Greenhouse-style structured interview proces
Call out any experience with Ashby, Greenhouse-style structured interview processes, or running hiring loops — if the role is recruiting, ops, or people focused. Tools matter at small companies.
Remove filler
Remove filler. Cut objective statements, high school entries, unrelated part-time work over a decade old, and soft-skill claims without evidence. One clean page of real outcomes beats two pages of buzzwords.
Link to concrete artifacts — GitHub, Scholar, a personal site, a conference talk
Link to concrete artifacts — GitHub, Scholar, a personal site, a conference talk, a publication, a security advisory you authored. Adaptive hiring managers click through. An empty GitHub for an engineering role is a negative signal unless explained.
Avoid overclaiming on deepfake or AI-security expertise if you do not have it
Avoid overclaiming on deepfake or AI-security expertise if you do not have it. The hiring team will probe. It is much better to say you are motivated to learn the category than to inflate past work.
Save and upload as a PDF with a sensible filename (Firstname_Lastname_Resume
Save and upload as a PDF with a sensible filename (Firstname_Lastname_Resume.pdf). Ashby parses it correctly. Do not send a Google Docs link without a PDF backup.
ATS System: Ashby
Adaptive Security uses Ashby as its applicant tracking system at jobs.ashbyhq.com/adaptive. Ashby is a modern, founder-friendly ATS popular with Series A and Series B startups funded by tier-one investors. It parses PDF resumes cleanly, supports structured interview scorecards, and is less forgiving of keyword-stuffing tricks than older enterprise systems because Ashby-using companies tend to have humans reading every application.
- Apply at the canonical board: jobs.ashbyhq.com/adaptive. Avoid third-party listings that may route through a recruiter attribution layer you do not need.
- Upload a PDF resume — Ashby parses PDF reliably. Word documents and Google Docs links are accepted but add friction.
- Fill in the optional cover letter or free-text field. Ashby surfaces it prominently to reviewers. Three to five specific sentences outperform a long generic letter.
- Ashby supports profile logins so you can track application status. Create an account rather than applying anonymously — you will see interview scheduling and status updates in one place.
- Do not spam-apply to multiple unrelated roles. Ashby shows hiring managers your full application history at the company. Two well-matched applications beat six scattered ones.
- Referrals work. If you know someone at Adaptive, ask them to submit you through Ashby's referral flow. Referral resumes typically get a guaranteed first-pass human review.
- Keep formatting simple. No multi-column layouts, no embedded images, no unusual fonts. Ashby handles standard layouts well; exotic ones occasionally break parsing.
- After applying, you will usually hear back within five to ten business days when the role is active. Silence beyond two weeks usually means the role moved forward with other candidates — a follow-up note is acceptable but rarely changes the outcome.
Interview Culture
Interviews at Adaptive Security carry the tone of a founder-led, execution-first startup.
What Adaptivesecurity Looks For
- Founders and operators who have shipped something real. Ownership and outcome orientation matter more than pedigree. A strong side project or open-source contribution can outweigh a brand-name employer.
- Urgency without panic. Adaptive is building in a fast-moving category where a six-month delay can mean losing the AI-native positioning to an incumbent. People who naturally move with speed while keeping quality high stand out.
- Directness and low ego. The team values people who say the hard thing clearly, change their mind when evidence demands it, and do not confuse confidence with being right.
- Genuine interest in the adversary. Whether you are in engineering, GTM, or operations, being curious about how attackers actually work — how voice cloning is commoditized, how CEO fraud pipelines operate, how LLM jailbreaks emerge — is a strong positive signal.
- Comfort with ambiguity. Series A companies ship without perfect requirements, pivot on evidence, and rewrite plans quarterly. Candidates who need fully defined problem statements tend not to thrive here.
- Written communication. Expect to write memos, threat models, customer one-pagers, or technical design docs in the interview or in your first week. Clear writing is a load-bearing skill at Adaptive, not a nice-to-have.
- Evidence of accelerating growth. Interviewers look for candidates who visibly learned and scaled in each prior role rather than plateauing. A steep slope beats a tall starting point.
- Security-aware judgment. Even non-security hires (designers, finance, people ops) are expected to reason about data handling, customer confidentiality, and operational discipline — this is a cybersecurity company selling into security-sensitive buyers.
- Calibration on risk and reward. Candidates who understand Series A equity realistically (dilution, strike prices, exit timelines), ask good questions, and do not over-index on cash base salary are a stronger cultural match.
- Long-term conviction about the AI-attacker thesis. Nobody needs to parrot a company line, but interviewers look for people who have thought independently about where AI-enabled social engineering is going over the next three to five years.
Frequently Asked Questions
Is Adaptive Security a good place to work?
How much funding has Adaptive Security raised?
Who founded Adaptive Security?
What does Adaptive Security actually do?
How is Adaptive different from KnowBe4 or Proofpoint?
What ATS does Adaptive Security use?
Is Adaptive Security remote-friendly?
How long does the interview process take?
Should I expect to meet the founders?
What is the compensation mix like?
What is the biggest risk of joining at this stage?
What backgrounds does Adaptive typically hire?
How should I prepare for the interview?
Open Positions
Adaptivesecurity currently has 9 open positions.
Related Resources
Sources
- Adaptive Security announces $43M Series A led by Andreessen Horowitz —
- a16z portfolio: Adaptive Security investment thesis —
- OpenAI Startup Fund portfolio —
- Adaptive Security careers (Ashby job board) —
- Brian Long LinkedIn profile (Attentive, TapCommerce, Adaptive) —
- Attentive Series E: company reaches $7B valuation —
- FBI IC3 report on AI-enabled social engineering and deepfake fraud —
- CISA guidance on AI-enabled cyber threats —
- SEC cybersecurity disclosure rule (final 2023) —
- EU NIS2 directive overview —
- MGM Resorts 2023 cyberattack (vishing vector reporting) —
- Ashby ATS product overview —