Key Takeaways
- Elisity, Inc. is a United States privately held cybersecurity software company headquartered in San Jose, California, building an identity-based microsegmentation platform for enterprise LAN and OT environments, founded in the 2018-2019 timeframe by veterans of Cisco, Viptela, and adjacent networking and security companies.
- The core product is Elisity Cloud Control Center with the Elisity IdentityGraph: an agentless, cloud-managed microsegmentation platform that enforces zero-trust policy on existing Cisco, Arista, Aruba, Juniper, and Extreme Networks infrastructure, integrated with Active Directory, Microsoft Entra ID, Okta, ServiceNow, and similar identity and IT-asset systems.
- James Winebrenner is widely publicly identified as Co-Founder and Chief Executive Officer, with a professional background at Cisco and Viptela; candidates should always verify the current executive team on elisity.com and LinkedIn before interviewing because titles at a roughly 100-to-200-person venture-backed company rotate faster than public press keeps up with.
- Publicly disclosed investors across Series A and Series B include Two Bear Capital, Atlantic Bridge, AllegisCyber Capital, Wipro Ventures, and Insight Partners, and Elisity has been profiled by cybersecurity trade press (Dark Reading, SC Magazine, CSO Online, SiliconANGLE, Forbes, and others) as a focused microsegmentation player with traction in healthcare, manufacturing, government, and financial services.
- The peer and competitive set includes Illumio, Akamai Guardicore Segmentation, Zero Networks, Airgap Networks, ColorTokens, and VMware NSX in microsegmentation; Cisco ISE, Cisco Secure Workload, Cisco TrustSec, and the 2024 Cisco Hypershield announcement from Cisco's portfolio; Aruba ClearPass, Portnox, and Forescout in NAC; Claroty, Dragos, Armis, and Medigate in OT and IoT visibility; and Zscaler, Netskope, Palo Alto Networks Prisma Access, and Cato Networks in ZTNA and SASE.
- Elisity hires through elisity.com/careers using a Greenhouse-adjacent applicant tracking flow, with a standard United States cybersecurity startup interview loop (recruiter screen, hiring manager, technical or functional deep dive, panel, and sometimes an executive conversation with James Winebrenner for senior roles) and a remote-friendly workforce anchored by a San Jose headquarters.
- Representative United States compensation bands for a Series B to Series C cybersecurity startup at Elisity's stage in 2024-2025 are broadly Software Engineer II around $130,000 to $175,000 base plus equity, Senior Engineer around $175,000 to $230,000 plus meaningful equity, Staff Engineer around $225,000 to $300,000 plus significant equity, Principal Engineer around $280,000 to $380,000 plus substantial equity, Engineering Manager around $220,000 to $310,000 plus significant equity, Director of Engineering around $290,000 to $400,000 plus substantial equity, Senior Product Manager around $180,000 to $260,000 plus equity, Senior Sales Engineer around $180,000 to $240,000 base with variable on-target earnings of roughly $280,000 to $360,000, and Enterprise Account Executive around $140,000 to $190,000 base with variable on-target earnings of roughly $300,000 to $450,000; individual offers vary by level, function, geography, and individual negotiation.
- Candidates interviewing at Elisity in 2025-2026 should expect conversations about the CISA Zero Trust Maturity Model 2.0, the NIST SP 800-207 zero-trust architecture, FDA medical device cybersecurity (2023 PATCH Act), NERC CIP for utilities, the wave of 2024 healthcare ransomware incidents, and the competitive implications of the 2024 Cisco Hypershield announcement for network-native microsegmentation.
About Elisity
Application Process
-
1
Start at elisity
Start at elisity.com/careers (linked from the main elisity.com navigation and footer), which is the canonical source of truth for open Elisity roles; the careers page lists active postings and typically redirects applications into an applicant tracking system (historically Greenhouse or a Greenhouse-adjacent hosted flow), so third-party aggregators such as LinkedIn, Indeed, Wellfound (formerly AngelList Talent), and Built In San Francisco Bay may occasionally lag, duplicate, or misrepresent current posting status. Treat elisity.com/careers as authoritative and confirm with the recruiter if a role appears elsewhere but not on the careers page.
-
2
Apply directly through elisity
Apply directly through elisity.com/careers rather than via LinkedIn Easy Apply or third-party redirect paths when possible; direct ATS applications land cleanly in the requisition with accurate source attribution, which Elisity recruiters use for sorting and follow-up cadence, and they avoid the occasional data-mapping issues that LinkedIn Easy Apply introduces for fields such as work authorization, sponsorship, US citizenship for federal-facing roles, and location preference.
-
3
Identify the career track you are applying to before writing anything: Software
Identify the career track you are applying to before writing anything: Software Engineering (backend services in Go, Python, Rust, or Java; data and streaming; frontend in React and TypeScript), Network Engineering (deep Layer 2 / Layer 3 networking and enforcement integration with Cisco, Arista, Aruba, Juniper, and Extreme Networks), Security Engineering (zero-trust architecture, microsegmentation design, and customer-facing technical leadership), Site Reliability and DevOps (cloud infrastructure, Kubernetes, Terraform, observability), Product Management (cybersecurity products, healthcare vertical, and OT and industrial segments), Product Design and UX Research (enterprise SaaS and complex data visualization), Sales (enterprise Account Executives, Sales Engineers and Solution Architects, and channel and partner roles tied to Cisco resellers and MSSPs), Customer Success and Technical Support, Marketing (technical content, demand generation, and healthcare-focused marketing), and corporate functions including Finance, People, Legal, and Compliance.
-
4
Prepare a single, clean PDF resume in US English plus a short tailored cover let
Prepare a single, clean PDF resume in US English plus a short tailored cover letter or summary paragraph that names the specific role and the specific Elisity vertical (healthcare, manufacturing and OT, government and critical infrastructure, financial services, or retail) you would expect to support; cybersecurity recruiters see hundreds of applications on popular roles, and an opening sentence that names the vertical, the product surface, and a concrete problem you want to work on measurably improves your odds of a recruiter screen.
-
5
Expect a standard United States cybersecurity startup interview loop for most ro
Expect a standard United States cybersecurity startup interview loop for most roles: a recruiter screen on Zoom or phone (roughly 30 minutes), a hiring manager conversation (45 to 60 minutes), a technical or functional deep dive (which may include a take-home exercise, a live coding or systems design session, or an architectural walkthrough for engineering, security, and product roles), a panel or virtual onsite with three to five colleagues and cross-functional partners, and, for senior and leadership roles, a conversation with an executive or directly with James Winebrenner; plan for the full loop to run two to four weeks on a healthy cadence and longer for specialized staff-plus and director roles.
-
6
For software engineering roles, expect a technical screen that reflects Elisity'
For software engineering roles, expect a technical screen that reflects Elisity's realistic stack: backend services in Go, Python, Rust, or Java; data pipelines and event streaming; cloud-native services at meaningful scale; Kubernetes-based deployment; infrastructure-as-code with Terraform; and frontend work in React and TypeScript including data visualization for network topology and policy. Be prepared to discuss distributed systems design, API design, testing and deployment discipline, and how you would build for an always-on multi-tenant control plane that customers rely on for production policy enforcement.
-
7
For network and security engineering roles, expect deep, specific questioning on
For network and security engineering roles, expect deep, specific questioning on Layer 2 and Layer 3 networking (VLANs, switching, routing, trunking), identity-driven access control (Cisco TrustSec, 802.1X, MAB, TACACS+, RADIUS), integrations with Cisco, Arista, Aruba, Juniper, and Extreme Networks platforms, and an understanding of how segmentation policy should be expressed and enforced across a heterogeneous enterprise network. CCNP-level or CCIE-level network fluency is a meaningful differentiator for core platform and solution architect roles.
-
8
For product management, design, and customer-facing technical roles, expect conv
For product management, design, and customer-facing technical roles, expect conversations and exercises grounded in Elisity's real verticals: how you would improve the medical-device segmentation workflow for a 500-bed hospital, how you would design policy authoring for an OT engineer unfamiliar with traditional cybersecurity tooling, how you would prioritize detections and recommendations for a CISO who must demonstrate zero-trust progress to their board, or how you would reduce time-to-value for a new customer rolling out microsegmentation across 50,000 endpoints.
-
9
Expect honest conversations about work authorization, United States citizenship,
Expect honest conversations about work authorization, United States citizenship, and potential security clearance needs early in the process; most Elisity roles hire candidates with existing US work authorization, and H-1B sponsorship is typically considered on a case-by-case basis for specialized engineering and security roles. For roles that support federal, defense, or critical-infrastructure customers, United States citizenship or permanent residency is often preferred and, for some customer programs, a United States security clearance (up to and including Top Secret) may become relevant. Confirm eligibility with the recruiter before investing in a full loop if any of those dimensions matter to you.
-
10
Plan for reference checks at offer stage and, for most roles, a standard United
Plan for reference checks at offer stage and, for most roles, a standard United States background check; Elisity builds a product that sits on the critical path of customer production networks and has visibility into sensitive IT and OT asset inventories, and candidates in roles that touch customer data, production infrastructure, or federal and critical-infrastructure programs should expect background verification consistent with enterprise cybersecurity vendors serving HIPAA-regulated, CIP / NERC-regulated, and federal environments.
Resume Tips for Elisity
Open your resume with a short professional summary that names the role family yo
Open your resume with a short professional summary that names the role family you are targeting (for example, Senior Backend Engineer focused on distributed control planes, Network Engineer focused on identity-driven segmentation, Security Engineer focused on zero-trust architecture, Enterprise Account Executive focused on healthcare cybersecurity, or Sales Engineer focused on OT and critical infrastructure) and signals clear awareness that Elisity is an identity-based microsegmentation platform serving enterprise and regulated industries, not a generic SaaS or generic ZTNA vendor; cybersecurity hiring managers screen hard for candidates who understand the product category.
Mirror language directly from the Elisity job description into your resume becau
Mirror language directly from the Elisity job description into your resume because applicant tracking systems rank by keyword match; include relevant technical terms (Go, Python, Rust, Java, React, TypeScript, Kubernetes, Terraform, AWS, GCP, PostgreSQL, Kafka, gRPC, REST, OpenAPI), network and identity terms (microsegmentation, zero trust, Cisco TrustSec, 802.1X, MAB, TACACS+, RADIUS, VLAN, Active Directory, Entra ID, Okta, ServiceNow), and domain terms (HIPAA, FDA medical device cybersecurity, CIP / NERC, CISA Zero Trust Maturity Model, OT, ICS, SCADA, IoT, medical devices, ransomware containment) that match the posting.
For software engineering roles, show evidence of production-grade backend or fro
For software engineering roles, show evidence of production-grade backend or frontend craft on systems that actually mattered: distributed systems you designed or owned, throughput and latency numbers you improved, reliability incidents you led, multi-tenant control-plane patterns you built, and security-sensitive features (authentication, authorization, secrets, audit logging) you shipped. Elisity's engineering culture values pragmatic systems engineers who can reason about correctness in production, not only frameworks-of-the-moment.
For network engineering and security engineering roles, quantify depth over brea
For network engineering and security engineering roles, quantify depth over breadth: the largest and most heterogeneous networks you have designed, configured, or defended; the specific vendor platforms (Cisco Catalyst and Nexus, Arista EOS, Aruba CX, Juniper JUNOS, Extreme Networks) you have worked with at meaningful scale; the zero-trust or segmentation projects you have led end-to-end; the ransomware, advanced threat, or nation-state incidents you have contained or remediated; and any CCNP, CCIE, CISSP, OSCP, GIAC, or equivalent certifications that are relevant. Senior candidates who have actually run a segmentation rollout across tens of thousands of endpoints stand out sharply.
For product management and design roles, name the verticals and user archetypes
For product management and design roles, name the verticals and user archetypes you have worked with: hospital IT and biomedical engineering, manufacturing and OT engineers, federal IT, utility cyber teams (CIP compliance), financial services security architects, and enterprise CISOs. Product and design candidates who can articulate how a medical-device engineer experiences a segmentation tool differently from a traditional security operations center (SOC) analyst, or who have shipped complex-data visualizations for network topology or policy, progress further.
For sales, sales engineering, and customer success roles, quantify commercial ou
For sales, sales engineering, and customer success roles, quantify commercial outcomes: annual contract value of deals closed, renewal and expansion rates, sales-cycle length for enterprise cybersecurity deals, named accounts in healthcare, manufacturing, government, or financial services, and specific experience selling to or supporting hospital systems, state and local government, federal civilian agencies, or CIP / NERC-regulated utilities. Prior experience at comparable vendors (Illumio, Akamai Guardicore, Zscaler, Palo Alto Networks, CrowdStrike, SentinelOne, Forescout, Claroty, Dragos, Armis, Cisco, Arista, Aruba, VMware) is directly relevant and should be named explicitly.
For marketing, demand generation, and content roles, foreground cybersecurity-sp
For marketing, demand generation, and content roles, foreground cybersecurity-specific experience: named accounts or verticals you have driven pipeline into, technical content you have co-authored with subject-matter experts, events you have owned or supported (RSA Conference, Black Hat USA, HIMSS, S4, and regional ISSA / ISACA chapters), and an honest grasp of how cybersecurity buying cycles differ from generic enterprise SaaS.
For DevOps, SRE, and platform engineering roles, lead with production reliabilit
For DevOps, SRE, and platform engineering roles, lead with production reliability and security posture: uptime and mean time to recovery for the systems you owned, incident-response discipline, cloud architecture choices (AWS, GCP, Kubernetes), infrastructure-as-code patterns (Terraform), and supply-chain security practices (SBOM, signed images, reproducible builds, secrets management). Elisity is a cybersecurity vendor, and candidates who treat the security of the vendor's own platform seriously are valued accordingly.
Use a clean, single-column, ATS-friendly resume in US English with clear section
Use a clean, single-column, ATS-friendly resume in US English with clear section headings (Summary, Experience, Skills, Education, Certifications) and a file size under 2 MB; avoid images, tables, icons, and two-column layouts because they consistently break parsing across ATS platforms and push otherwise strong candidates down the stack. Save the file with a simple name (for example, FirstName_LastName_Resume.pdf).
Keep the resume to one page for candidates with fewer than roughly ten years of
Keep the resume to one page for candidates with fewer than roughly ten years of experience and to two pages for senior, staff-plus, and leadership candidates; do not pad with unrelated content, and do not include a generic objective statement. Elisity hiring managers read quickly for a concrete match between your background, a specific function, and a specific kind of cybersecurity problem. A focused two-page resume consistently outperforms a padded three-page resume.
ATS System: Elisity Careers Portal (Greenhouse-adjacent)
Elisity publishes open roles on elisity.com/careers, which behaves as a Greenhouse or Greenhouse-adjacent hosted careers experience typical of United States cybersecurity startups at this stage. In practice, that means the careers page lists active requisitions and routes applications into a structured applicant tracking system that parses a PDF resume into a candidate profile, collects role-specific custom screening questions (work authorization, United States citizenship for federal-facing roles, location and remote preference, compensation expectations, equal employment opportunity data), and supports pipeline stages, scorecards, and structured interview kits. Candidates should always verify the specific ATS underneath elisity.com/careers at application time because cybersecurity startups do occasionally change ATS vendors, and the underlying form (Greenhouse, Lever, Ashby, or a custom portal) determines small but meaningful details of how your application is parsed and tracked. Treat elisity.com/careers as the single canonical source of truth for Elisity openings, and disregard aggregators that repost stale, misattributed, or scraped listings.
- Apply directly through elisity.com/careers rather than through LinkedIn Easy Apply or third-party aggregator redirects; direct ATS applications land cleanly in the Elisity requisition with accurate source attribution, which recruiters use for sorting and follow-up cadence and which avoids the data-mapping issues that one-click apply flows introduce for work authorization, sponsorship, and location preference.
- Upload a single, clean PDF resume in US English under 2 MB with simple section headings (Summary, Experience, Skills, Education, Certifications) so the ATS parses it correctly; avoid two-column layouts, text boxes, embedded images, and graphic icons because these commonly break parsing and push otherwise strong candidates down the stack.
- Use the exact keywords that appear in the Elisity job description, including technical stack terms (Go, Python, Rust, Java, React, TypeScript, Kubernetes, Terraform), network and identity terms (microsegmentation, zero trust, Cisco TrustSec, 802.1X, Active Directory, Entra ID, Okta, ServiceNow), and vertical terms (healthcare, HIPAA, FDA medical device cybersecurity, OT, ICS, SCADA, CIP / NERC, federal, critical infrastructure) that match the posting; ATS keyword ranking happens before a human reviews.
- Answer every custom screening question fully and specifically; cybersecurity recruiters use ATS screening questions to filter for United States work authorization, sponsorship needs, United States citizenship for federal-facing roles, security clearance status, location preference, compensation expectations, and relevant domain experience (healthcare cybersecurity, OT, NAC, segmentation). Blank, vague, or dismissive answers are routinely used to screen candidates out before resume review.
- Write a tailored cover letter or summary addressed to the specific role and the specific Elisity vertical, referencing how you would use your background to help hospital systems, manufacturers, utilities, federal agencies, or financial institutions achieve zero-trust segmentation; generic cover letters are visible immediately to recruiters who see hundreds per requisition.
- If you hold relevant industry certifications (CCNP, CCIE, CISSP, OSCP, CISM, CCSP, GIAC GCIH / GCFA / GPEN, AWS or GCP cloud certifications, Microsoft Azure security certifications, Splunk or Elastic certifications), list them clearly in a dedicated Certifications section near the top of the resume; ATS keyword scans often include certification names and cybersecurity hiring managers use them as early signal.
- Keep your LinkedIn profile consistent with your resume because Elisity recruiters routinely cross-reference the two; conflicting titles, dates, or scope between LinkedIn and the ATS resume upload raise flags, while aligned profiles make it easier for the recruiter to advocate for you internally.
- Monitor your email, including spam and promotions folders, for messages from Elisity recruiters and from the underlying ATS provider; automated ATS notifications are easy to miss, and missing a first-stage invitation or a scheduling link can cost you a slot in an interview panel that is already filling up.
Complete Elisity Careers Portal (Greenhouse-adjacent) Resume Guide →
Interview Culture
What Elisity Looks For
- Genuine familiarity with Elisity's actual product category: identity-based microsegmentation for enterprise LAN and OT environments, delivered through a cloud control plane and enforced on existing network infrastructure without endpoint agents or hardware replacement; strong candidates have read the product pages and public content, can distinguish Elisity from Illumio, Akamai Guardicore, VMware NSX, and network access control tools, and can articulate at least one vertical (healthcare, manufacturing, government, financial services) with specificity.
- Professional depth in a discipline Elisity actually needs: distributed-systems backend engineering (Go, Python, Rust, or Java), data and streaming platforms, cloud-native deployment (Kubernetes, Terraform, AWS or GCP), frontend and data visualization engineering (React, TypeScript), deep multi-vendor network engineering (Cisco, Arista, Aruba, Juniper, Extreme Networks), security engineering focused on zero-trust and segmentation, site reliability and platform engineering, product management for cybersecurity and OT, product and UX design for enterprise security tooling, and enterprise go-to-market functions (AE, SE, customer success, channel, technical marketing).
- A working grasp of the healthcare cybersecurity context, since healthcare is one of Elisity's most visible verticals; candidates who understand hospital IT and biomedical engineering workflows, the impact of the 2024 Change Healthcare and Ascension ransomware incidents, HIPAA obligations, and the 2023 FDA medical device cybersecurity requirements (widely referenced as the PATCH Act) tend to interview unusually well for product, engineering, sales, and marketing roles that touch healthcare.
- A working grasp of the operational technology (OT) and critical-infrastructure context; familiarity with industrial control systems, SCADA networks, NERC CIP compliance for electric utilities, the 2022 CISA Shields Up guidance, the Colonial Pipeline and Oldsmar water-treatment incidents, and the 2024 CrowdStrike-triggered Windows outage as a cautionary tale on production change management all earn respect in interviews for OT-facing roles.
- A credible point of view on zero-trust architecture; interviewers respond well to candidates who can discuss the CISA Zero Trust Maturity Model (current version 2.0, 2023), NIST SP 800-207 on zero-trust architecture, and how identity-based microsegmentation complements rather than replaces endpoint detection and response, ZTNA / SASE, and traditional network access control.
- Evidence of collaboration across engineering, security research, product, design, customer success, and sales; Elisity is mid-sized enough that functional silos do not scale, and hiring managers screen for candidates who have shipped real outcomes with cross-functional partners rather than operating as isolated individual contributors.
- For engineering candidates, a bias toward production craft over novelty: rigorous testing habits, strong observability and incident discipline, careful API and data-model design, security-first engineering for a product that sits on customer critical paths, and willingness to improve legacy surfaces rather than rewrite from scratch.
- For network and security engineering candidates, demonstrable fluency with heterogeneous enterprise networks and the realities of brownfield rollouts; candidates who can discuss the differences between enforcing segmentation on Cisco Catalyst, Arista EOS, Aruba CX, Juniper EX / QFX, and Extreme Networks platforms, and who can honestly discuss the operational risk of policy changes in production, stand out.
- For product, design, and customer-facing candidates, user empathy grounded in the realities of security and network operators; a hospital CISO, a manufacturing OT engineer, a federal civilian agency network lead, and a utility cyber compliance officer are core buyer archetypes, and candidates who can name those archetypes and design for them are directly valuable.
- A long-term orientation and respect for the fact that Elisity operates in a crowded, well-funded cybersecurity market against much larger competitors (Cisco, Illumio, Akamai, Zscaler, Palo Alto Networks, CrowdStrike, SentinelOne); candidates who present as committed to building a durable, differentiated platform over multiple years tend to progress further than candidates looking for a short resume entry.
Frequently Asked Questions
Who runs Elisity and how should candidates think about leadership stability?
Does Elisity sponsor work visas, and what about United States citizenship requirements?
Is the workforce remote, hybrid, or in-office, and how important is being in San Jose?
What does the technology stack look like for engineering candidates?
What is compensation like at Elisity in 2025-2026?
What does Elisity actually sell, and how does that shape interview conversations?
Which verticals should candidates focus on, and why is healthcare so prominent?
How does Elisity compare to Illumio, Akamai Guardicore, Zero Networks, ColorTokens, and VMware NSX?
How should candidates think about the 2024 Cisco Hypershield announcement?
How does Elisity handle the security of its own platform?
How should candidates think about the CISA Zero Trust Maturity Model and NIST SP 800-207?
What should candidates expect about equity, liquidity, and the private-company reality?
Are there language requirements beyond English, and how should bilingual candidates position themselves?
Open Positions
Elisity currently has 10 open positions.
Related Resources
Similar Companies
Related Articles
- LLM Engineer Resume: Prompt Engineering, Fine-Tuning, and Generative AI Systems
- Android Developer Resume: Kotlin, Jetpack Compose, and Play Store Success
- Technical Architect Resume: System Design, Enterprise Architecture, and Technology Strategy
- Software Engineer Resume: Complete Guide with Examples
- Skills-First Resume for Tech: Migration Guide with Examples
Sources
- Elisity corporate website and careers page —
- Elisity product overview: Cloud Control Center and IdentityGraph —
- Elisity leadership page (verify current executive team before interview) —
- Crunchbase profile: Elisity funding history and investors —
- CISA Zero Trust Maturity Model version 2.0 (2023) —
- NIST Special Publication 800-207: Zero Trust Architecture —
- United States Food and Drug Administration medical device cybersecurity guidance —
- Dark Reading coverage of microsegmentation and enterprise zero-trust —
- SC Magazine (SC Media) cybersecurity industry coverage —
- CSO Online enterprise security coverage —
- SiliconANGLE coverage of Elisity and cybersecurity startups —
- Forbes cybersecurity coverage (Change Healthcare, Ascension, and 2024 healthcare ransomware context) —
- Cisco Hypershield announcement (2024) for network-native security context —
- Illumio, peer microsegmentation vendor for competitive context —
- Glassdoor (United States) interview and compensation data for Elisity and peer cybersecurity startups —