How to Apply to Armis

16 min read Last updated April 20, 2026 6 open positions

Key Takeaways

  • Armis is an agentless cyber exposure management platform that built its reputation by giving security teams visibility into the unmanaged and unmanageable devices (OT, IoT, IoMT, building automation, network gear) that traditional endpoint and network tools cannot see, and that thesis still defines the company culturally and technically.
  • The platform now spans five Armis Centrix product lines (Asset Management and Security, OT/IoT Security, Medical Device Security, Vulnerability Prioritization and Remediation, and Early Warning), and your career mobility is strongest if you understand how all five fit into a customer's end-to-end exposure management program.
  • Armis is dual-headquartered in spirit if not on paper: San Francisco is the corporate and US sales center, while Tel Aviv is the engineering, security research, and product center, and the company runs on the rhythm of US Pacific and Israel Standard Time with meaningful coordination overhead.
  • Interviews are rigorous and engineering-led, with practical coding or domain rounds, concrete system design discussions grounded in real multi-tenant streaming telemetry infrastructure, and a values round that probes ownership, intellectual honesty, and customer obsession; Tel Aviv panels in particular are direct and technically demanding.
  • Resumes that quantify impact in device coverage, risk reduction, vulnerability remediation throughput, integration deployment, and revenue or renewal numbers, and that use cyber exposure management vocabulary precisely, score significantly higher in both Greenhouse ATS triage and reviewer evaluation.
  • Armis has executed two strategic acquisitions in 2024: Silk Security (vulnerability prioritization and remediation orchestration) and CTCI (AI-powered cyber threat intelligence and pre-exploitation early warning), and candidates should expect questions about their familiarity with the post-acquisition product integrations and the broader exposure management thesis.
  • Competition is real and intensifying: Claroty (with the Medigate acquisition behind it), Nozomi Networks, Microsoft Defender for IoT (built on the CyberX acquisition), Palo Alto Networks IoT Security (built on the Zingbox acquisition), and Forescout are all credible alternatives in different segments, and candidates should be able to articulate how Armis differentiates without dismissing competitors.
  • Armis has been widely discussed as an IPO candidate in the 2025 to 2026 window, but timing has slipped from earlier expectations and depends on broader market conditions; treat the IPO as a possibility rather than a near-term certainty and model your equity offer accordingly.
  • The company has implemented a return-to-office mandate for hub-tagged roles, with Tel Aviv, San Francisco, Washington DC, and Bengaluru as the most common in-office expectations; remote work is available for some field sales and customer success roles but is not the default, and candidates should clarify hub expectations explicitly during the recruiter screen.
  • Compensation includes a competitive base salary calibrated to hub and level, equity in the form of stock options (with RSUs offered at senior levels and certain jurisdictions), comprehensive medical and retirement benefits, and a performance bonus or sales commission depending on track; as a late-stage private company Armis equity carries both upside and the usual private-company liquidity considerations.

About Armis

Armis Security is a cyber exposure management and asset intelligence company headquartered in San Francisco, California, with its primary research and development center in Tel Aviv, Israel and a globally distributed go-to-market organization of approximately 700 employees. The company was founded in 2015 by Yevgeny Dibrov, who serves as Chief Executive Officer, and Nadir Izrael, who serves as Chief Technology Officer, both veterans of Unit 8200, the Israel Defense Forces signals intelligence unit that has produced a generation of cybersecurity founders including the teams behind Check Point, Palo Alto Networks, CyberArk, SentinelOne, and Wiz. Dibrov and Izrael started Armis with a contrarian thesis that traditional endpoint and network security tools were structurally blind to the largest and fastest-growing population of devices on enterprise networks: the unmanaged and unmanageable devices that cannot run an agent, including industrial control systems, building automation controllers, medical devices, smart cameras, printers, video conferencing endpoints, network gear, BMS sensors, and an exploding long tail of operational technology and Internet of Things hardware. Their answer was an agentless platform that passively profiles every device communicating on a customer's network, fingerprints it against a crowdsourced device knowledge base of more than five billion devices, and continuously assesses its risk posture, behavior, and exposure without ever installing software on the device itself. From that foundation Armis has expanded into a broader cyber exposure management platform that now spans Armis Centrix for Asset Management and Security, Armis Centrix for OT/IoT Security, Armis Centrix for Medical Device Security, Armis Centrix for Vulnerability Prioritization and Remediation (anchored by the 2024 acquisition of Silk Security), and Armis Centrix for Early Warning (anchored by the 2024 acquisition of CTCI, an AI-powered cyber threat intelligence company that scours dark web sources for pre-exploitation signals). The platform's customer base is concentrated in industries where a single compromised unmanaged device can cause physical, regulatory, or human harm: hospitals and integrated delivery networks (Mount Sinai, Sarasota Memorial, and a meaningful share of US health systems), manufacturing and pharma (Mondelez, Colgate-Palmolive, Takeda), utilities and critical infrastructure, federal civilian and defense agencies, and global financial services. Armis has raised more than 850 million dollars in equity and debt across rounds led by Insight Partners, General Catalyst, Sequoia Capital, CapitalG (Alphabet's growth fund), Brookfield Technology Partners, and Goldman Sachs Asset Management, with the most recent funding rounds in 2024 placing the company at a valuation in the neighborhood of 4.2 billion dollars. The company has publicly disclosed crossing 200 million dollars in annual recurring revenue in 2024 and has been widely reported as targeting a public offering in the 2025 to 2026 window, although the exact timing remains subject to market conditions and has slipped from earlier expectations. Candidates evaluating Armis should understand that they are joining a late-stage private security company with a credible IPO trajectory, a defensible technical moat in a category that competitors Claroty, Nozomi Networks, Microsoft Defender for IoT, Palo Alto Networks IoT Security, and Forescout are all aggressively contesting, and a culture that fuses Tel Aviv Israeli engineering intensity with US enterprise sales and marketing discipline.

Application Process

  1. 1
    Search and apply through armis

    Search and apply through armis.com/careers, which routes every requisition through Greenhouse at boards.greenhouse.io/armissecurity; create a single Greenhouse profile so you can apply to multiple roles, upload one canonical resume, and track status across requisitions in a single view rather than fragmenting your application history across duplicate accounts with different email addresses.

  2. 2
    Expect a recruiter screen within one to three weeks of applying for shortlisted

    Expect a recruiter screen within one to three weeks of applying for shortlisted candidates; the recruiter will calibrate on geography (San Francisco HQ, Tel Aviv R&D, Washington DC for federal and intelligence community roles, regional US sales territories, EMEA hubs in London, Munich, Milan, and Vienna, APAC hubs in Bengaluru and Sydney), work authorization, compensation expectations, motivation for Armis specifically rather than the broader IoT security category, and your familiarity with unmanaged device security, OT, and the cyber exposure management buyer.

  3. 3
    Engineering candidates typically complete a hiring manager conversation focused

    Engineering candidates typically complete a hiring manager conversation focused on the platform you would be joining (Asset Intelligence Engine, Centrix application suite, OT/IoT, Medical Device, Vulnerability Prioritization, Early Warning threat intelligence, Platform, or Data and ML), with deep questions on prior production scale, your reasoning about agentless network telemetry, and how you think about the trade-off between breadth of device coverage and depth of risk analysis.

  4. 4
    Technical exercises follow for most engineering tracks; common formats include a

    Technical exercises follow for most engineering tracks; common formats include a take-home coding exercise scoped to roughly two to four hours, a live pair programming session in a language relevant to the team (Go, Python, TypeScript, or Scala depending on the platform layer), a system design discussion calibrated to your level, and for security research candidates a vulnerability analysis, packet capture review, or device fingerprinting exercise.

  5. 5
    Onsite or virtual loops typically include four to six interviews covering coding

    Onsite or virtual loops typically include four to six interviews covering coding or domain depth, system design grounded in real Armis scale (billions of device observations, multi-tenant SaaS, near-real-time streaming analytics), a values and behavioral round, a cross-functional collaboration round with a product manager or partner team engineer, and for senior tracks a portfolio or architecture deep dive on past production work; expect Tel Aviv panels to be direct, technically demanding, and fast-paced in the Israeli engineering tradition.

  6. 6
    Go-to-market candidates (Account Executive, Sales Engineer, Customer Success Man

    Go-to-market candidates (Account Executive, Sales Engineer, Customer Success Manager, Business Development Representative, Channel and Alliances) follow a parallel loop that emphasizes a presentation or mock customer pitch to a CISO or OT security leader persona, MEDDPICC or similar enterprise qualification methodology, demonstrated familiarity with the unmanaged device and OT security buyer, vertical depth in healthcare, manufacturing, utilities, or federal where applicable, and a final panel with regional sales leadership.

  7. 7
    Federal and intelligence community roles based in the Washington DC and Baltimor

    Federal and intelligence community roles based in the Washington DC and Baltimore metro area carry additional clearance and citizenship requirements that the recruiter will surface in the first conversation; expect questions about active TS/SCI clearance status, polygraph history if relevant, and prior experience supporting civilian agencies, the Department of Defense, or the intelligence community.

  8. 8
    Offers are typically extended within one to three weeks of the final loop, often

    Offers are typically extended within one to three weeks of the final loop, often preceded by an informal verbal heads-up from the recruiter; relocation packages, visa sponsorship for qualifying roles in the US, equity grants in the form of stock options for most levels with RSUs at senior tiers, and a return-to-office expectation for roles tagged to a specific hub are all standard, and candidates should clarify hub expectations explicitly in the offer conversation rather than after acceptance.


Resume Tips for Armis

recommended

Lead with measurable security and engineering impact rather than responsibilitie

Lead with measurable security and engineering impact rather than responsibilities: specify the number of unmanaged devices you brought under visibility, the percentage of OT or medical device fleets you risk-assessed, mean time to detect or remediate device-related incidents, vulnerability backlog reduction, scan or telemetry latency improvements, and revenue or renewal numbers for go-to-market candidates, always with the baseline you started from.

recommended

Use cyber exposure management vocabulary precisely

Use cyber exposure management vocabulary precisely. Armis reviewers respond to accurate references to OT (operational technology), IoT, IoMT (Internet of Medical Things), ICS (industrial control systems), SCADA, BMS (building management systems), passive network monitoring, span ports and network TAPs, deep packet inspection, device fingerprinting, MAC OUI identification, NAC integration, EDR enrichment, CMDB reconciliation, MITRE ATT&CK for ICS, IEC 62443, NIST 800-82, NIST CSF 2.0, HIPAA, FDA premarket cybersecurity, and EPSS plus KEV for vulnerability prioritization, and they notice when these terms are misused.

recommended

Surface direct experience with comparable platforms explicitly

Surface direct experience with comparable platforms explicitly. If you have deployed, evaluated, or competed against Claroty xDome or CTD, Nozomi Networks Vantage or Guardian, Microsoft Defender for IoT, Palo Alto Networks IoT Security, Forescout, Dragos, Ordr, Medigate (now Claroty), Asimily, Cynerio, Tenable OT Security, or Rapid7 Insight for OT, name the product and the specific use case rather than burying it in a tool list.

recommended

Translate adjacent experience into Armis-relevant language

Translate adjacent experience into Armis-relevant language. If you have worked on network observability (ExtraHop, Corelight, Zeek, Suricata, NDR), CMDB and ITSM (ServiceNow, Jira Service Management), SIEM and SOAR (Splunk, Sentinel, QRadar, Chronicle, XSOAR, Tines), or cloud security posture management, name the integrations and the operational problems you solved rather than just listing the tooling.

recommended

For software roles, list languages and stacks honestly with depth indicators

For software roles, list languages and stacks honestly with depth indicators. Armis writes meaningful production code in Go and Python for backend and data services, TypeScript and React for the Centrix UI, and uses Kafka, ClickHouse, PostgreSQL, Elasticsearch, Spark, and Kubernetes on AWS at the platform layer; for the Asset Intelligence Engine specifically, depth in graph data modeling, streaming analytics, anomaly detection, or applied ML for device classification is differentiating.

recommended

For security research and threat intelligence candidates, surface concrete publi

For security research and threat intelligence candidates, surface concrete public artifacts. Armis Labs has published high-profile vulnerability disclosures including BlueBorne, BleedingBit, URGENT/11, CDPwn, Access:7, and TLStorm, and recruiters notice candidates with public CVEs, CVE assignments, conference talks at DEF CON, Black Hat, S4, RSA, or BSides, and meaningful contributions to MITRE ATT&CK or vendor coordinated disclosure programs.

recommended

For sales and customer success candidates, quantify quota attainment, average de

For sales and customer success candidates, quantify quota attainment, average deal size, sales cycle length, logos closed in regulated verticals (healthcare, manufacturing, utilities, federal), and net revenue retention; vertical specialization in healthcare or OT is a meaningful differentiator and should be explicit rather than implied.

recommended

Mirror the vocabulary in the job description and on the Armis blog and product d

Mirror the vocabulary in the job description and on the Armis blog and product documentation: Armis Centrix, Asset Intelligence Engine, AI-powered, agentless, unmanaged, OT/IoT/IoMT, cyber exposure management, vulnerability prioritization, early warning, attack surface management. Matching this language improves both Greenhouse keyword scoring and interview rapport.

recommended

Keep the resume to one or two pages with a clean, conservative single-column lay

Keep the resume to one or two pages with a clean, conservative single-column layout and consistent typography; Greenhouse's parser favors simple structures over multi-column or graphic-heavy designs, and Armis recruiters and engineers read hundreds of resumes per quarter where a dense but legible single page outperforms a five-page narrative every time.



Interview Culture

Armis interviews are deliberately rigorous, technically demanding, and grounded in real product and customer scenarios rather than puzzle questions detached from the business, with a recognizable Israeli engineering directness in the Tel Aviv panels and a more conventional US enterprise software cadence in the San Francisco and field organizations. Expect interviewers to be working engineers, security researchers, product managers, or solutions engineers who currently support the systems and customers you would be joining, and expect them to push past the first answer until they understand exactly how you think and where the boundaries of your knowledge actually are. A common opening is a behavioral conversation that quickly becomes a project walkthrough, and your interviewer will keep asking why and what would break if at every layer until the architecture, the trade-offs, the failure modes, and the operational implications of running an agentless platform across millions of devices are fully exposed. Coding rounds for engineering candidates focus on practical problem solving in the language of the team rather than competitive programming trivia, with an emphasis on correctness, edge cases, code clarity, and how you would test, instrument, and operate the solution; for security research and Asset Intelligence Engine roles you should expect deeper questions on packet parsing, protocol reverse engineering, device fingerprinting heuristics, anomaly detection, and how to reason about false positives versus false negatives when a misclassification could either cause an alert storm or miss a compromised infusion pump. System design rounds at Armis are unusually concrete because the platform actually ingests telemetry from billions of device observations and has to scale across multi-tenant deployments where customers range from a single hospital to a global manufacturer with hundreds of plants; expect prompts about designing a streaming ingestion pipeline for network telemetry, a device classification service backed by a global knowledge base, a near-real-time risk scoring engine, a vulnerability correlation system, an integration framework for dozens of NAC, EDR, SIEM, and CMDB partners, and a tenant isolation model that holds up under regulatory audit. The values and behavioral round probes for ownership, intellectual honesty, customer obsession, and willingness to operate in ambiguity, and Tel Aviv interviewers in particular will push hard on disagreements with peers and managers to see how you handle conflict. Decisions are made by full loop debriefs where every interviewer must justify their recommendation with specific evidence from the conversation. The tone is direct, candid, and engineering-led rather than performative. Interviewers respond well to candidates who admit what they do not know, describe failures with what they learned, show genuine curiosity about unmanaged device security and the OT and healthcare verticals, and can articulate a point of view on the agentless versus agent-based debate that has defined the IoT security category. They respond poorly to confident bluffing, security theater, dismissiveness toward operational technology or clinical engineering teams, or treating IT security frameworks as automatically applicable to ICS and medical device environments where the priorities of safety, availability, and regulatory continuity often invert the usual confidentiality-first model.

What Armis Looks For

  • Engineers and security professionals who genuinely believe agentless visibility is the right primitive for unmanaged device security, with concrete stories about classifying, risk-scoring, or protecting devices that cannot run a software agent.
  • Hands-on builders who have shipped and operated production systems at scale, ideally with multi-tenant SaaS experience, streaming data pipelines, and an instinct for the operational realities of running a platform that ingests telemetry from billions of device observations.
  • Pragmatic problem solvers who can balance breadth of device coverage, depth of risk analysis, accuracy of classification, and operational cost without retreating into a single discipline or treating any one dimension as the only one that matters.
  • People with credible domain expertise in at least one Armis vertical (healthcare and IoMT, manufacturing and ICS, utilities and critical infrastructure, federal civilian and defense, financial services) or in a foundational platform layer (data, ML, integrations, identity, cloud infrastructure).
  • Strong written and verbal communicators who can explain complex security and engineering decisions clearly to network engineers, OT operators, clinical engineering teams, CISOs, and regulators, since Armis employees regularly interact with both deeply technical and executive-level audiences.
  • Collaborative teammates who can work asynchronously across San Francisco, Tel Aviv, Washington DC, Bengaluru, London, and a globally distributed sales organization, with strong written communication habits and a comfort with the time zone realities of a US-Israeli company.
  • Security researchers with public credibility through CVEs, conference talks, vendor coordinated disclosure participation, or contributions to MITRE ATT&CK, particularly for Armis Labs roles where Armis has built a brand around high-profile vulnerability disclosures including BlueBorne, BleedingBit, URGENT/11, CDPwn, Access:7, and TLStorm.
  • Sales and customer success professionals with proven enterprise quota attainment, vertical specialization in healthcare, manufacturing, utilities, or federal, and the patience to navigate a multi-stakeholder buying process that often spans IT security, OT or clinical engineering, network operations, and procurement.
  • Candidates with a long-term mindset who are excited by the multi-year arc of consolidating cyber exposure management, expanding from device visibility into vulnerability prioritization and threat intelligence, and helping a late-stage private company evolve through an IPO and into public-company scale and discipline.

Frequently Asked Questions

What ATS does Armis use, and how should I apply?
Armis uses Greenhouse as its applicant tracking system, accessed through armis.com/careers and hosted at boards.greenhouse.io/armissecurity (note that the slug is armissecurity, not armis). Create a single Greenhouse profile so you can apply to multiple roles, upload one canonical resume in PDF format with a clean single-column layout, and track status for every requisition in one place. Avoid duplicate profiles with different email addresses, which fragment your application history. Greenhouse parsers favor simple typography, standard section headings (Experience, Education, Skills, Projects), and avoid columns or graphics that scramble during text extraction.
Where is Armis hiring, and what is the office model?
Armis is dual-anchored in San Francisco (corporate headquarters and US go-to-market) and Tel Aviv (primary research and development, security research, and product), with significant additional teams in the Washington DC and Baltimore metro area for federal and intelligence community work, Bengaluru for engineering and customer support, London, Munich, Milan, Vienna, and other European cities for EMEA sales and solutions engineering, and Sydney and other APAC hubs for regional coverage. Most hub-tagged roles carry a return-to-office expectation of three to five days per week depending on the team, while some field sales, customer success, and federal roles are remote-eligible within the relevant geography. Confirm the office expectation explicitly with your recruiter rather than assuming from the job posting.
Does Armis sponsor work visas?
Armis sponsors work visas for qualifying technical and senior go-to-market roles in the United States (H-1B, O-1, and green card processing for tenured employees), and Israeli work permits for non-Israeli citizens hired into the Tel Aviv office in select cases. Sponsorship volume varies by team, level, fiscal year, and role, and not every requisition is open to sponsorship. Federal and intelligence community roles based in the Washington DC area typically require US citizenship and an active or eligible security clearance, which is not a sponsorship matter but a hard prerequisite. Confirm sponsorship and clearance eligibility for the specific role with your recruiter during the initial screen.
What does the interview loop look like for software engineers?
A typical software engineering loop includes a recruiter screen, a hiring manager conversation focused on the team and product surface, a technical exercise (either a take-home of roughly two to four hours or a live pair programming session in Go, Python, or TypeScript depending on the team), and an onsite or virtual loop of four to six rounds covering coding or domain depth, system design appropriate to your level, a cross-functional collaboration round with a product manager or partner team engineer, and a values and behavioral round. Senior, staff, and principal candidates typically present a portfolio piece or architecture deep dive on past production work to a panel of senior engineers, and Tel Aviv loops are often more compressed in calendar time but more demanding in technical depth than the typical US loop.
How should I prepare for Armis system design interviews?
Armis system design rounds are unusually concrete because the platform actually ingests telemetry from billions of device observations across multi-tenant customers ranging from a single hospital to a global manufacturer. Prepare by studying multi-tenant SaaS patterns, streaming ingestion pipelines (Kafka, Pulsar, Kinesis), columnar analytics stores (ClickHouse, Druid, BigQuery), graph data modeling for device relationships, near-real-time risk scoring, integration architectures for connecting dozens of NAC, EDR, SIEM, and CMDB partners, and tenant isolation that holds up under HIPAA, IEC 62443, FedRAMP, and other regulatory audits. Be ready to discuss capacity planning, blast radius containment, customer data isolation, the cost economics of running streaming analytics across very large device fleets, and the trade-offs between centralized cloud processing and edge collectors deployed inside customer networks.
What technical skills matter most across Armis roles?
Across most engineering tracks, the highest-leverage skills are at least one of Armis's primary platform languages (Go for backend and data services, Python for data and ML, TypeScript and React for the Centrix UI), distributed systems and multi-tenant SaaS experience, depth in at least one product surface (asset intelligence, OT/IoT, medical device, vulnerability prioritization, threat intelligence), and operational maturity demonstrated through on-call experience and incident response. Asset Intelligence Engine roles add depth in network protocol analysis, packet capture, device fingerprinting heuristics, and applied ML for classification. OT and medical device roles add depth in ICS protocols (Modbus, DNP3, OPC UA, PROFINET, BACnet) and clinical engineering or industrial process knowledge. Threat intelligence roles built on the CTCI acquisition add depth in dark web collection, adversary tracking, and AI-driven signal extraction.
What is Armis Labs and why does it matter for security research candidates?
Armis Labs is the company's public security research arm, responsible for high-profile vulnerability disclosures that have shaped the unmanaged device security category, including BlueBorne (Bluetooth stack vulnerabilities affecting billions of devices), BleedingBit (BLE chip vulnerabilities in enterprise access points), URGENT/11 (VxWorks TCP/IP stack vulnerabilities), CDPwn (Cisco Discovery Protocol vulnerabilities), Access:7 (PTC Axeda agent vulnerabilities widely deployed in medical and industrial devices), and TLStorm (APC Smart-UPS vulnerabilities). Armis Labs roles are limited in number but highly visible internally and externally, and candidates with public CVEs, conference talks at DEF CON, Black Hat, S4, RSA, or BSides, and a track record of responsible coordinated disclosure are strongly preferred. The team values originality, deep protocol and firmware analysis skills, and the discipline to coordinate disclosure ethically across vendors, customers, and regulators.
How does Armis compare to Claroty, Nozomi, Microsoft Defender for IoT, and Palo Alto IoT Security?
Armis differentiates primarily on three dimensions: first, agentless architecture without requiring physical sensors or span ports in many deployments (Armis can ingest from existing infrastructure including switches, firewalls, EDR, and NAC), where Claroty xDome and Nozomi Guardian have historically leaned more on appliance or sensor-based collection; second, breadth of device coverage across IT, OT, IoT, and IoMT in a single platform, where Microsoft Defender for IoT and Palo Alto IoT Security tend to be stronger in their respective ecosystems but narrower across verticals; third, depth of crowdsourced device knowledge with billions of device profiles in the Asset Intelligence Engine, which is the longest-standing and most-cited differentiator. Candidates should be able to articulate these distinctions accurately without dismissing competitors, since interviewers know the category well and respect intellectual honesty about where Armis is genuinely stronger versus where the competitive picture is more nuanced.
What is Armis's IPO trajectory and what should candidates make of it?
Armis has been widely discussed as an IPO candidate since at least 2023, with the company crossing 200 million dollars in annual recurring revenue in 2024 and a valuation in the neighborhood of 4.2 billion dollars after its most recent funding rounds. CEO Yevgeny Dibrov has publicly indicated readiness for a public offering in the 2025 to 2026 window, but actual timing depends on broader market conditions for cybersecurity IPOs and has slipped from earlier expectations. Treat IPO timing as a possibility rather than a near-term certainty, evaluate your offer on the assumption that liquidity may take longer than you hope, and ask your recruiter about the most recent 409A valuation, secondary tender programs, and equity refresh policy. Joining a late-stage company is a different equity bet than joining at Series A and should be modeled accordingly.
What is compensation and equity like at Armis?
Armis compensation includes a competitive base salary calibrated to hub and level, a performance bonus or sales commission depending on track, equity in the form of stock options (with RSUs offered for senior levels and select jurisdictions), comprehensive medical and retirement benefits, generous time off, parental leave, and a strong learning and development culture including conference attendance and security certification reimbursement. San Francisco and Tel Aviv compensation tends to be at the high end of the market for cybersecurity scale-ups, with Washington DC federal roles typically including additional considerations for clearance work, and Bengaluru and EMEA hubs calibrated to local benchmarks. As a late-stage private company, Armis equity carries both meaningful upside if the company executes a successful public offering and the usual private-company liquidity considerations, so model your offer carefully and ask the recruiter about secondary tender history, equity refresh cycles, and the most recent 409A valuation.
What is the return-to-office expectation at Armis?
Armis has implemented a return-to-office mandate for hub-tagged roles, with the most common expectation being three to five days per week in office for engineering, product, and corporate functions in San Francisco, Tel Aviv, Washington DC, and Bengaluru. The rationale, communicated internally, is that the company believes in-person collaboration accelerates the kind of cross-functional product and engineering work that Armis depends on, particularly given the US-Israel time zone overlap challenges. Some field sales, customer success, and federal roles remain remote-eligible within the relevant geography, but remote work is not the default. If office presence is a deal-breaker, surface that in the recruiter screen and ask explicitly about the office expectation for the specific requisition rather than relying on the job posting language.
How do I differentiate myself if I do not have prior OT or medical device security experience?
You do not need prior OT or medical device security experience to succeed at Armis, particularly for platform, data, frontend, and core engineering roles. What matters is demonstrated depth in adjacent areas (network observability, distributed systems, multi-tenant SaaS, streaming analytics, ML applied to classification problems, or large-scale operations) and the ability to reason rigorously about agentless visibility and the unmanaged device problem in your interviews. Translate your past work into the language of device coverage, risk scoring accuracy, false positive management, and operational efficiency, and study Armis's product portfolio enough to ask informed questions about how the role connects to Asset Management, OT/IoT, Medical Device, Vulnerability Prioritization, or Early Warning. For go-to-market candidates, the equivalent is demonstrating the ability to navigate complex multi-stakeholder enterprise sales cycles even if you have not sold into hospitals, manufacturers, or utilities specifically.

Open Positions

Armis currently has 6 open positions.

Check Your Resume Before Applying → View 6 open positions at Armis

Related Resources

Similar Companies

Related Articles


Sources