How to Apply to Elisity

24 min read Last updated April 20, 2026 10 open positions

Key Takeaways

  • Elisity, Inc. is a United States privately held cybersecurity software company headquartered in San Jose, California, building an identity-based microsegmentation platform for enterprise LAN and OT environments, founded in the 2018-2019 timeframe by veterans of Cisco, Viptela, and adjacent networking and security companies.
  • The core product is Elisity Cloud Control Center with the Elisity IdentityGraph: an agentless, cloud-managed microsegmentation platform that enforces zero-trust policy on existing Cisco, Arista, Aruba, Juniper, and Extreme Networks infrastructure, integrated with Active Directory, Microsoft Entra ID, Okta, ServiceNow, and similar identity and IT-asset systems.
  • James Winebrenner is widely publicly identified as Co-Founder and Chief Executive Officer, with a professional background at Cisco and Viptela; candidates should always verify the current executive team on elisity.com and LinkedIn before interviewing because titles at a roughly 100-to-200-person venture-backed company rotate faster than public press keeps up with.
  • Publicly disclosed investors across Series A and Series B include Two Bear Capital, Atlantic Bridge, AllegisCyber Capital, Wipro Ventures, and Insight Partners, and Elisity has been profiled by cybersecurity trade press (Dark Reading, SC Magazine, CSO Online, SiliconANGLE, Forbes, and others) as a focused microsegmentation player with traction in healthcare, manufacturing, government, and financial services.
  • The peer and competitive set includes Illumio, Akamai Guardicore Segmentation, Zero Networks, Airgap Networks, ColorTokens, and VMware NSX in microsegmentation; Cisco ISE, Cisco Secure Workload, Cisco TrustSec, and the 2024 Cisco Hypershield announcement from Cisco's portfolio; Aruba ClearPass, Portnox, and Forescout in NAC; Claroty, Dragos, Armis, and Medigate in OT and IoT visibility; and Zscaler, Netskope, Palo Alto Networks Prisma Access, and Cato Networks in ZTNA and SASE.
  • Elisity hires through elisity.com/careers using a Greenhouse-adjacent applicant tracking flow, with a standard United States cybersecurity startup interview loop (recruiter screen, hiring manager, technical or functional deep dive, panel, and sometimes an executive conversation with James Winebrenner for senior roles) and a remote-friendly workforce anchored by a San Jose headquarters.
  • Representative United States compensation bands for a Series B to Series C cybersecurity startup at Elisity's stage in 2024-2025 are broadly Software Engineer II around $130,000 to $175,000 base plus equity, Senior Engineer around $175,000 to $230,000 plus meaningful equity, Staff Engineer around $225,000 to $300,000 plus significant equity, Principal Engineer around $280,000 to $380,000 plus substantial equity, Engineering Manager around $220,000 to $310,000 plus significant equity, Director of Engineering around $290,000 to $400,000 plus substantial equity, Senior Product Manager around $180,000 to $260,000 plus equity, Senior Sales Engineer around $180,000 to $240,000 base with variable on-target earnings of roughly $280,000 to $360,000, and Enterprise Account Executive around $140,000 to $190,000 base with variable on-target earnings of roughly $300,000 to $450,000; individual offers vary by level, function, geography, and individual negotiation.
  • Candidates interviewing at Elisity in 2025-2026 should expect conversations about the CISA Zero Trust Maturity Model 2.0, the NIST SP 800-207 zero-trust architecture, FDA medical device cybersecurity (2023 PATCH Act), NERC CIP for utilities, the wave of 2024 healthcare ransomware incidents, and the competitive implications of the 2024 Cisco Hypershield announcement for network-native microsegmentation.

About Elisity

Elisity, Inc. is a United States privately held cybersecurity software company headquartered in San Jose, California, that builds an identity-based microsegmentation platform for enterprise LAN and operational technology (OT) environments. The company was founded in the 2018-2019 timeframe by a group of network and security veterans, many with backgrounds at Cisco, Viptela, and adjacent networking and security businesses; James Winebrenner is widely publicly identified as Co-Founder and Chief Executive Officer, having previously served in senior leadership roles at Cisco following Cisco's acquisition of SD-WAN pioneer Viptela. Candidates should always verify the current executive team and any specific title before an interview loop on elisity.com and via LinkedIn, because leadership roles at a venture-backed, roughly 100-to-200-person company at Elisity's stage can rotate on a cadence faster than public press keeps up with, and individual titles (chief technology officer, chief product officer, chief revenue officer, chief information security officer, chief financial officer, and vice presidents of engineering, product, customer success, and marketing) do change as the company scales. The core product is the Elisity Cloud Control Center together with the Elisity IdentityGraph, a cloud-managed identity-based microsegmentation platform designed to enforce zero-trust policy across enterprise networks without requiring endpoint agents, without hardware replacement, and without a disruptive network redesign. Elisity's technical approach treats users, devices, Internet of Things (IoT) endpoints, operational technology (OT) assets, and applications as first-class identities, and then uses the network infrastructure a customer already has (typically Cisco, Arista, HP Aruba, Juniper, and Extreme Networks switches and routers) as the enforcement surface. IdentityGraph ingests data from identity providers including Microsoft Active Directory, Microsoft Entra ID (formerly Azure Active Directory), and Okta, and from IT and operations sources such as ServiceNow and adjacent configuration management databases (CMDBs), to build a continuously updated graph of who and what is on a customer's network. Policy is defined in business terms (roles, device types, risk posture, compliance tags) rather than in IP addresses, and is pushed to existing switches and routers for lateral-traffic enforcement, allowing security teams to implement zero-trust segmentation and ransomware containment without a forklift upgrade. The platform also emphasizes agentless discovery and classification of unmanaged devices, a meaningful differentiator when contrasted with endpoint-agent-first microsegmentation approaches. Elisity sits in a cybersecurity peer landscape that has become notably more crowded since 2020. Direct microsegmentation peers include Illumio (widely considered the leader in enterprise microsegmentation), Akamai Guardicore Segmentation (Guardicore was acquired by Akamai in 2021), Zero Networks, Airgap Networks, ColorTokens, and VMware NSX in software-defined data center environments. Cisco's own portfolio, including Cisco Identity Services Engine (ISE), Cisco Secure Workload, Cisco TrustSec, and the 2024 Cisco Hypershield announcement, is both a partner ecosystem for Elisity (because Elisity often enforces on Cisco gear) and a competitive overlap, particularly where Cisco sells network-native segmentation into its own installed base. Adjacent NAC (network access control) vendors, including Aruba ClearPass, Portnox, and Forescout, overlap with Elisity's discovery and classification value but historically focus on access and posture rather than lateral microsegmentation. In the OT and IoT visibility space, Claroty, Dragos, Armis, and Medigate (acquired by Claroty in 2021) are common reference names in healthcare and industrial conversations. In the broader zero-trust network access (ZTNA) and secure access service edge (SASE) market, Zscaler, Netskope, Palo Alto Networks Prisma Access, and Cato Networks serve a different but adjacent zero-trust use case (secure remote access) that customers often evaluate alongside a microsegmentation project. Endpoint detection and response vendors CrowdStrike, SentinelOne, and Microsoft Defender for Endpoint also come up in interview conversations, because segmentation, EDR, and identity are increasingly bought together as part of a ransomware-resilience program. Public funding disclosures, Crunchbase, and industry press place Elisity's investor base across Series A and Series B rounds completed in the early 2020s with participants that have included Two Bear Capital, Atlantic Bridge, AllegisCyber Capital, Wipro Ventures, and Insight Partners; candidates should treat any specific dollar figure as directional and confirm current capitalization state with the recruiter, since private-company funding totals, valuation, and cap-table structure are never fully captured in press releases. Elisity has been consistently reported across cybersecurity trade coverage (including outlets such as Dark Reading, SC Magazine, CSO Online, and SiliconANGLE) as a focused, technically serious microsegmentation startup with particular traction in healthcare, manufacturing, and government and critical infrastructure verticals. The company is remote-friendly, maintains its corporate headquarters in San Jose, and hires globally for specialized engineering and go-to-market roles while centering decision-making in the United States. The broader 2024-2025 market context is directly material to how candidates should approach interviews. Healthcare has been the single most visible ransomware target in the United States, including the 2024 Change Healthcare and Ascension incidents, and the United States Cybersecurity and Infrastructure Security Agency (CISA) has aggressively pushed zero-trust adoption through the CISA Zero Trust Maturity Model, now at version 2.0 (2023), including for federal agencies and critical-infrastructure operators. The United States Food and Drug Administration (FDA) has published cybersecurity guidance for medical devices tied to the 2023 legislative changes widely referenced as the PATCH Act, which require medical device manufacturers and their operating hospitals to account for segmentation and lifecycle security. These regulatory and threat tailwinds are directly relevant to Elisity's healthcare and OT positioning and are routinely discussed in customer and partner conversations. At the same time, 2024's launch of Cisco Hypershield has signaled that incumbent networking vendors intend to compete aggressively in the network-native segmentation space, which raises the strategic stakes for a focused, well-funded but still relatively small player like Elisity.

Application Process

  1. 1
    Start at elisity

    Start at elisity.com/careers (linked from the main elisity.com navigation and footer), which is the canonical source of truth for open Elisity roles; the careers page lists active postings and typically redirects applications into an applicant tracking system (historically Greenhouse or a Greenhouse-adjacent hosted flow), so third-party aggregators such as LinkedIn, Indeed, Wellfound (formerly AngelList Talent), and Built In San Francisco Bay may occasionally lag, duplicate, or misrepresent current posting status. Treat elisity.com/careers as authoritative and confirm with the recruiter if a role appears elsewhere but not on the careers page.

  2. 2
    Apply directly through elisity

    Apply directly through elisity.com/careers rather than via LinkedIn Easy Apply or third-party redirect paths when possible; direct ATS applications land cleanly in the requisition with accurate source attribution, which Elisity recruiters use for sorting and follow-up cadence, and they avoid the occasional data-mapping issues that LinkedIn Easy Apply introduces for fields such as work authorization, sponsorship, US citizenship for federal-facing roles, and location preference.

  3. 3
    Identify the career track you are applying to before writing anything: Software

    Identify the career track you are applying to before writing anything: Software Engineering (backend services in Go, Python, Rust, or Java; data and streaming; frontend in React and TypeScript), Network Engineering (deep Layer 2 / Layer 3 networking and enforcement integration with Cisco, Arista, Aruba, Juniper, and Extreme Networks), Security Engineering (zero-trust architecture, microsegmentation design, and customer-facing technical leadership), Site Reliability and DevOps (cloud infrastructure, Kubernetes, Terraform, observability), Product Management (cybersecurity products, healthcare vertical, and OT and industrial segments), Product Design and UX Research (enterprise SaaS and complex data visualization), Sales (enterprise Account Executives, Sales Engineers and Solution Architects, and channel and partner roles tied to Cisco resellers and MSSPs), Customer Success and Technical Support, Marketing (technical content, demand generation, and healthcare-focused marketing), and corporate functions including Finance, People, Legal, and Compliance.

  4. 4
    Prepare a single, clean PDF resume in US English plus a short tailored cover let

    Prepare a single, clean PDF resume in US English plus a short tailored cover letter or summary paragraph that names the specific role and the specific Elisity vertical (healthcare, manufacturing and OT, government and critical infrastructure, financial services, or retail) you would expect to support; cybersecurity recruiters see hundreds of applications on popular roles, and an opening sentence that names the vertical, the product surface, and a concrete problem you want to work on measurably improves your odds of a recruiter screen.

  5. 5
    Expect a standard United States cybersecurity startup interview loop for most ro

    Expect a standard United States cybersecurity startup interview loop for most roles: a recruiter screen on Zoom or phone (roughly 30 minutes), a hiring manager conversation (45 to 60 minutes), a technical or functional deep dive (which may include a take-home exercise, a live coding or systems design session, or an architectural walkthrough for engineering, security, and product roles), a panel or virtual onsite with three to five colleagues and cross-functional partners, and, for senior and leadership roles, a conversation with an executive or directly with James Winebrenner; plan for the full loop to run two to four weeks on a healthy cadence and longer for specialized staff-plus and director roles.

  6. 6
    For software engineering roles, expect a technical screen that reflects Elisity'

    For software engineering roles, expect a technical screen that reflects Elisity's realistic stack: backend services in Go, Python, Rust, or Java; data pipelines and event streaming; cloud-native services at meaningful scale; Kubernetes-based deployment; infrastructure-as-code with Terraform; and frontend work in React and TypeScript including data visualization for network topology and policy. Be prepared to discuss distributed systems design, API design, testing and deployment discipline, and how you would build for an always-on multi-tenant control plane that customers rely on for production policy enforcement.

  7. 7
    For network and security engineering roles, expect deep, specific questioning on

    For network and security engineering roles, expect deep, specific questioning on Layer 2 and Layer 3 networking (VLANs, switching, routing, trunking), identity-driven access control (Cisco TrustSec, 802.1X, MAB, TACACS+, RADIUS), integrations with Cisco, Arista, Aruba, Juniper, and Extreme Networks platforms, and an understanding of how segmentation policy should be expressed and enforced across a heterogeneous enterprise network. CCNP-level or CCIE-level network fluency is a meaningful differentiator for core platform and solution architect roles.

  8. 8
    For product management, design, and customer-facing technical roles, expect conv

    For product management, design, and customer-facing technical roles, expect conversations and exercises grounded in Elisity's real verticals: how you would improve the medical-device segmentation workflow for a 500-bed hospital, how you would design policy authoring for an OT engineer unfamiliar with traditional cybersecurity tooling, how you would prioritize detections and recommendations for a CISO who must demonstrate zero-trust progress to their board, or how you would reduce time-to-value for a new customer rolling out microsegmentation across 50,000 endpoints.

  9. 9
    Expect honest conversations about work authorization, United States citizenship,

    Expect honest conversations about work authorization, United States citizenship, and potential security clearance needs early in the process; most Elisity roles hire candidates with existing US work authorization, and H-1B sponsorship is typically considered on a case-by-case basis for specialized engineering and security roles. For roles that support federal, defense, or critical-infrastructure customers, United States citizenship or permanent residency is often preferred and, for some customer programs, a United States security clearance (up to and including Top Secret) may become relevant. Confirm eligibility with the recruiter before investing in a full loop if any of those dimensions matter to you.

  10. 10
    Plan for reference checks at offer stage and, for most roles, a standard United

    Plan for reference checks at offer stage and, for most roles, a standard United States background check; Elisity builds a product that sits on the critical path of customer production networks and has visibility into sensitive IT and OT asset inventories, and candidates in roles that touch customer data, production infrastructure, or federal and critical-infrastructure programs should expect background verification consistent with enterprise cybersecurity vendors serving HIPAA-regulated, CIP / NERC-regulated, and federal environments.


Resume Tips for Elisity

recommended

Open your resume with a short professional summary that names the role family yo

Open your resume with a short professional summary that names the role family you are targeting (for example, Senior Backend Engineer focused on distributed control planes, Network Engineer focused on identity-driven segmentation, Security Engineer focused on zero-trust architecture, Enterprise Account Executive focused on healthcare cybersecurity, or Sales Engineer focused on OT and critical infrastructure) and signals clear awareness that Elisity is an identity-based microsegmentation platform serving enterprise and regulated industries, not a generic SaaS or generic ZTNA vendor; cybersecurity hiring managers screen hard for candidates who understand the product category.

recommended

Mirror language directly from the Elisity job description into your resume becau

Mirror language directly from the Elisity job description into your resume because applicant tracking systems rank by keyword match; include relevant technical terms (Go, Python, Rust, Java, React, TypeScript, Kubernetes, Terraform, AWS, GCP, PostgreSQL, Kafka, gRPC, REST, OpenAPI), network and identity terms (microsegmentation, zero trust, Cisco TrustSec, 802.1X, MAB, TACACS+, RADIUS, VLAN, Active Directory, Entra ID, Okta, ServiceNow), and domain terms (HIPAA, FDA medical device cybersecurity, CIP / NERC, CISA Zero Trust Maturity Model, OT, ICS, SCADA, IoT, medical devices, ransomware containment) that match the posting.

recommended

For software engineering roles, show evidence of production-grade backend or fro

For software engineering roles, show evidence of production-grade backend or frontend craft on systems that actually mattered: distributed systems you designed or owned, throughput and latency numbers you improved, reliability incidents you led, multi-tenant control-plane patterns you built, and security-sensitive features (authentication, authorization, secrets, audit logging) you shipped. Elisity's engineering culture values pragmatic systems engineers who can reason about correctness in production, not only frameworks-of-the-moment.

recommended

For network engineering and security engineering roles, quantify depth over brea

For network engineering and security engineering roles, quantify depth over breadth: the largest and most heterogeneous networks you have designed, configured, or defended; the specific vendor platforms (Cisco Catalyst and Nexus, Arista EOS, Aruba CX, Juniper JUNOS, Extreme Networks) you have worked with at meaningful scale; the zero-trust or segmentation projects you have led end-to-end; the ransomware, advanced threat, or nation-state incidents you have contained or remediated; and any CCNP, CCIE, CISSP, OSCP, GIAC, or equivalent certifications that are relevant. Senior candidates who have actually run a segmentation rollout across tens of thousands of endpoints stand out sharply.

recommended

For product management and design roles, name the verticals and user archetypes

For product management and design roles, name the verticals and user archetypes you have worked with: hospital IT and biomedical engineering, manufacturing and OT engineers, federal IT, utility cyber teams (CIP compliance), financial services security architects, and enterprise CISOs. Product and design candidates who can articulate how a medical-device engineer experiences a segmentation tool differently from a traditional security operations center (SOC) analyst, or who have shipped complex-data visualizations for network topology or policy, progress further.

recommended

For sales, sales engineering, and customer success roles, quantify commercial ou

For sales, sales engineering, and customer success roles, quantify commercial outcomes: annual contract value of deals closed, renewal and expansion rates, sales-cycle length for enterprise cybersecurity deals, named accounts in healthcare, manufacturing, government, or financial services, and specific experience selling to or supporting hospital systems, state and local government, federal civilian agencies, or CIP / NERC-regulated utilities. Prior experience at comparable vendors (Illumio, Akamai Guardicore, Zscaler, Palo Alto Networks, CrowdStrike, SentinelOne, Forescout, Claroty, Dragos, Armis, Cisco, Arista, Aruba, VMware) is directly relevant and should be named explicitly.

recommended

For marketing, demand generation, and content roles, foreground cybersecurity-sp

For marketing, demand generation, and content roles, foreground cybersecurity-specific experience: named accounts or verticals you have driven pipeline into, technical content you have co-authored with subject-matter experts, events you have owned or supported (RSA Conference, Black Hat USA, HIMSS, S4, and regional ISSA / ISACA chapters), and an honest grasp of how cybersecurity buying cycles differ from generic enterprise SaaS.

recommended

For DevOps, SRE, and platform engineering roles, lead with production reliabilit

For DevOps, SRE, and platform engineering roles, lead with production reliability and security posture: uptime and mean time to recovery for the systems you owned, incident-response discipline, cloud architecture choices (AWS, GCP, Kubernetes), infrastructure-as-code patterns (Terraform), and supply-chain security practices (SBOM, signed images, reproducible builds, secrets management). Elisity is a cybersecurity vendor, and candidates who treat the security of the vendor's own platform seriously are valued accordingly.

recommended

Use a clean, single-column, ATS-friendly resume in US English with clear section

Use a clean, single-column, ATS-friendly resume in US English with clear section headings (Summary, Experience, Skills, Education, Certifications) and a file size under 2 MB; avoid images, tables, icons, and two-column layouts because they consistently break parsing across ATS platforms and push otherwise strong candidates down the stack. Save the file with a simple name (for example, FirstName_LastName_Resume.pdf).

recommended

Keep the resume to one page for candidates with fewer than roughly ten years of

Keep the resume to one page for candidates with fewer than roughly ten years of experience and to two pages for senior, staff-plus, and leadership candidates; do not pad with unrelated content, and do not include a generic objective statement. Elisity hiring managers read quickly for a concrete match between your background, a specific function, and a specific kind of cybersecurity problem. A focused two-page resume consistently outperforms a padded three-page resume.



Interview Culture

Interviewing at Elisity sits squarely in the United States cybersecurity startup tradition, shaped by the company's San Jose headquarters, its Cisco and Viptela leadership heritage, and its product focus on identity-based microsegmentation for enterprise, healthcare, and critical-infrastructure customers. Candidates who approach an Elisity loop with the rhythm they would use for a well-funded, product-led cybersecurity company at Series B or Series C scale (Illumio, Zscaler in its earlier years, SentinelOne, Forescout, Claroty, Dragos) tend to find the process recognizable and fair. The tone is direct, technical, and unflashy: interviewers are generally warm but will test substantively, they will not oversell the company beyond what the product and roadmap actually are, and they put real weight on whether you understand that the customers are security and network teams operating high-stakes environments where a configuration mistake can affect hospital operations, manufacturing lines, utility reliability, or financial transactions. Recruiter screens at Elisity focus on the basics and on fit: your background, what you are looking for, compensation expectations, location and remote or hybrid preferences, work authorization and any citizenship or clearance considerations, timeline, and a first read on why this specific company and this specific role. Strong candidates treat the recruiter screen as an opportunity to demonstrate that they have actually read the product and blog content on elisity.com, that they understand identity-based microsegmentation as a category distinct from endpoint-agent microsegmentation and from network access control, and that they have a point of view on at least one vertical (healthcare, manufacturing and OT, government, or financial services). Weak candidates treat it as a throwaway stage and are screened out. Hiring manager and technical rounds vary by function. Software engineering candidates can expect a technical screen that emphasizes practical distributed-systems problem-solving over contest-style algorithmic puzzles, with an eye on how you think about building a multi-tenant cloud control plane that customers depend on for production policy enforcement. Expect conversations about API design, data modeling, event streaming, observability, deployment discipline, and the security of the vendor platform itself (authentication, authorization, secrets management, audit logging, supply-chain security). Network engineering candidates should be prepared for specific, deep questioning on Layer 2 and Layer 3 design, identity-driven access control, and multi-vendor switching and routing integration. Security engineering candidates should expect conversations about zero-trust architecture, segmentation design patterns, ransomware containment, and the realities of rolling out microsegmentation across tens of thousands of heterogeneous endpoints. Product, design, and customer-facing technical loops typically work through a portfolio review or a product exercise that engages directly with Elisity's domain and expects informed, opinionated answers grounded in customer empathy. Expect scenarios such as how you would design a policy-authoring workflow for an OT engineer unfamiliar with traditional cybersecurity tooling, or how you would help a hospital segment its medical device estate without disrupting patient care. Sales, sales engineering, and customer success loops focus on how you would work with enterprise security and networking buyers, and where relevant on how you would partner with Cisco, Arista, Aruba, Juniper, and Extreme Networks channels and with managed security service providers (MSSPs). Expect discovery-style questions about prior territory or book ownership, average contract value, renewal motion, named accounts in healthcare and critical infrastructure, and familiarity with how enterprise cybersecurity deals actually close (proof of concept motion, reference architectures, compliance alignment, and security team sign-off). Across all tracks, Elisity interviewers tend to probe three softer dimensions carefully. First, collaboration and humility: Elisity is a mid-stage cybersecurity company where engineering, product, security research, customer success, and sales have to work in tight coordination across complex customer deployments, and candidates who present as lone brilliance without evidence of cross-functional trust do not progress. Second, long-term orientation: the company is founder-led and many of its early leaders came from Cisco and Viptela, where long product arcs are the norm, and interviewers tend to appreciate candidates thinking in multi-year arcs rather than short stops. Third, ethical seriousness about the product: microsegmentation is a production-critical control surface inside hospitals, utilities, and federal environments, and interviewers value candidates who can articulate, honestly, what it means to ship zero-trust policy safely and responsibly in a moment when ransomware against healthcare and critical infrastructure is at historic highs. Compensation and offer conversations at Elisity are typically direct and data-driven, grounded in United States cybersecurity startup benchmarks for a Series B to Series C stage company. The company is privately held and does not offer public-market RSU liquidity, so equity grants are typically framed as private-company stock options or restricted units that vest over four years (often with a one-year cliff), and candidates should expect transparent discussions about base salary, on-target earnings where applicable, equity, remote or hybrid expectations for roles with a San Jose preference, and any relocation considerations.

What Elisity Looks For

  • Genuine familiarity with Elisity's actual product category: identity-based microsegmentation for enterprise LAN and OT environments, delivered through a cloud control plane and enforced on existing network infrastructure without endpoint agents or hardware replacement; strong candidates have read the product pages and public content, can distinguish Elisity from Illumio, Akamai Guardicore, VMware NSX, and network access control tools, and can articulate at least one vertical (healthcare, manufacturing, government, financial services) with specificity.
  • Professional depth in a discipline Elisity actually needs: distributed-systems backend engineering (Go, Python, Rust, or Java), data and streaming platforms, cloud-native deployment (Kubernetes, Terraform, AWS or GCP), frontend and data visualization engineering (React, TypeScript), deep multi-vendor network engineering (Cisco, Arista, Aruba, Juniper, Extreme Networks), security engineering focused on zero-trust and segmentation, site reliability and platform engineering, product management for cybersecurity and OT, product and UX design for enterprise security tooling, and enterprise go-to-market functions (AE, SE, customer success, channel, technical marketing).
  • A working grasp of the healthcare cybersecurity context, since healthcare is one of Elisity's most visible verticals; candidates who understand hospital IT and biomedical engineering workflows, the impact of the 2024 Change Healthcare and Ascension ransomware incidents, HIPAA obligations, and the 2023 FDA medical device cybersecurity requirements (widely referenced as the PATCH Act) tend to interview unusually well for product, engineering, sales, and marketing roles that touch healthcare.
  • A working grasp of the operational technology (OT) and critical-infrastructure context; familiarity with industrial control systems, SCADA networks, NERC CIP compliance for electric utilities, the 2022 CISA Shields Up guidance, the Colonial Pipeline and Oldsmar water-treatment incidents, and the 2024 CrowdStrike-triggered Windows outage as a cautionary tale on production change management all earn respect in interviews for OT-facing roles.
  • A credible point of view on zero-trust architecture; interviewers respond well to candidates who can discuss the CISA Zero Trust Maturity Model (current version 2.0, 2023), NIST SP 800-207 on zero-trust architecture, and how identity-based microsegmentation complements rather than replaces endpoint detection and response, ZTNA / SASE, and traditional network access control.
  • Evidence of collaboration across engineering, security research, product, design, customer success, and sales; Elisity is mid-sized enough that functional silos do not scale, and hiring managers screen for candidates who have shipped real outcomes with cross-functional partners rather than operating as isolated individual contributors.
  • For engineering candidates, a bias toward production craft over novelty: rigorous testing habits, strong observability and incident discipline, careful API and data-model design, security-first engineering for a product that sits on customer critical paths, and willingness to improve legacy surfaces rather than rewrite from scratch.
  • For network and security engineering candidates, demonstrable fluency with heterogeneous enterprise networks and the realities of brownfield rollouts; candidates who can discuss the differences between enforcing segmentation on Cisco Catalyst, Arista EOS, Aruba CX, Juniper EX / QFX, and Extreme Networks platforms, and who can honestly discuss the operational risk of policy changes in production, stand out.
  • For product, design, and customer-facing candidates, user empathy grounded in the realities of security and network operators; a hospital CISO, a manufacturing OT engineer, a federal civilian agency network lead, and a utility cyber compliance officer are core buyer archetypes, and candidates who can name those archetypes and design for them are directly valuable.
  • A long-term orientation and respect for the fact that Elisity operates in a crowded, well-funded cybersecurity market against much larger competitors (Cisco, Illumio, Akamai, Zscaler, Palo Alto Networks, CrowdStrike, SentinelOne); candidates who present as committed to building a durable, differentiated platform over multiple years tend to progress further than candidates looking for a short resume entry.

Frequently Asked Questions

Who runs Elisity and how should candidates think about leadership stability?
James Winebrenner is widely publicly identified as Co-Founder and Chief Executive Officer of Elisity, with a professional background that includes senior roles at Cisco following Cisco's acquisition of the SD-WAN pioneer Viptela. Several of Elisity's co-founders and early leaders also come from Cisco, Viptela, and adjacent networking and security businesses, which is reflected in the company's product focus and technical depth. For interviewing purposes, candidates should always verify the current executive team on elisity.com and on LinkedIn before their loop, because specific titles at a roughly 100-to-200-person venture-backed company (chief technology officer, chief product officer, chief revenue officer, chief information security officer, chief financial officer, and vice presidents of engineering, product, customer success, and marketing) do rotate over time and press and blog coverage can lag public leadership announcements by several weeks or more.
Does Elisity sponsor work visas, and what about United States citizenship requirements?
For most roles Elisity hires candidates with existing United States work authorization. H-1B sponsorship has historically been considered on a case-by-case basis for specialized engineering, network, and security positions rather than as a default across all openings; sponsorship availability is typically called out in the job description or confirmed by the recruiter during the initial screen. For roles that support federal, defense, or critical-infrastructure customers, United States citizenship or permanent residency may be preferred, and for some customer programs a United States security clearance (up to and including Top Secret) may become relevant over time. If sponsorship, citizenship, or clearance is a consideration for you, raise it directly with the recruiter during the first screen and ask whether the specific requisition is eligible; do not assume from the presence of a listing that sponsorship or clearance sponsorship is automatically available.
Is the workforce remote, hybrid, or in-office, and how important is being in San Jose?
Elisity operates a remote-friendly model across many roles while maintaining its corporate headquarters in San Jose, California. Some roles are listed as fully remote within the United States, some are posted as San Jose Bay Area or hybrid with regular in-office expectations, and some executive and team-lead roles may carry a stronger preference for Bay Area presence because of customer, partner, and investor proximity. The specific expectation is typically stated in the job description and clarified by the recruiter. For candidates willing to relocate to or already based in the Bay Area, proximity to the broader San Francisco Bay Area cybersecurity ecosystem (including Palo Alto Networks, Zscaler, Illumio, SentinelOne, and others) is a meaningful professional asset, though not a requirement for most roles.
What does the technology stack look like for engineering candidates?
Based on public Elisity postings, engineering content, and typical choices at United States cybersecurity startups at Elisity's stage, the platform is a cloud-native multi-tenant control plane built on modern backend languages (commonly Go, Python, Rust, and Java), with event streaming and data pipelines feeding the IdentityGraph, a React and TypeScript frontend for topology and policy visualization, Kubernetes-based deployment, Terraform-managed infrastructure, and major public cloud providers (AWS and GCP). Integrations reach into Microsoft Active Directory, Microsoft Entra ID, Okta, ServiceNow, and multi-vendor network platforms including Cisco, Arista, Aruba, Juniper, and Extreme Networks. Stacks evolve, and exact language and framework choices vary by team; candidates should always confirm the current technology landscape with the hiring manager during the interview rather than assume one language or service is dominant simply from an older blog post or job description.
What is compensation like at Elisity in 2025-2026?
Elisity compensates at typical United States Series B to Series C cybersecurity startup bands. Representative reference ranges that align with public salary data for comparable roles are roughly $130,000 to $175,000 base plus equity for Software Engineer II roles, $175,000 to $230,000 plus meaningful equity for Senior Engineers, $225,000 to $300,000 plus significant equity for Staff Engineers, $280,000 to $380,000 plus substantial equity for Principal Engineers, $220,000 to $310,000 plus significant equity for Engineering Managers, $290,000 to $400,000 plus substantial equity for Directors of Engineering, $180,000 to $260,000 plus equity for Senior Product Managers, $180,000 to $240,000 base with variable on-target earnings of roughly $280,000 to $360,000 for Senior Sales Engineers, and $140,000 to $190,000 base with variable on-target earnings of roughly $300,000 to $450,000 for Enterprise Account Executives. Because Elisity is privately held, equity grants are private-company stock options or restricted units (typically four-year vesting with a one-year cliff) rather than publicly tradable stock, and candidates should evaluate equity in that light. Individual offers vary by level, function, geography, and negotiation.
What does Elisity actually sell, and how does that shape interview conversations?
Elisity sells an identity-based microsegmentation platform, centered on the Elisity Cloud Control Center and the IdentityGraph, that enforces zero-trust policy across enterprise LAN and OT environments using the network infrastructure a customer already has. The platform is agentless, integrates with Active Directory, Microsoft Entra ID, Okta, and ServiceNow for identity and asset context, and pushes policy to existing Cisco, Arista, Aruba, Juniper, and Extreme Networks switches and routers. In interviews, this business model surfaces in three recurring ways. First, candidates are expected to distinguish Elisity from endpoint-agent-first microsegmentation vendors (for example Illumio's host-agent model) and from network access control tools. Second, candidates are expected to understand that customers buy microsegmentation to contain ransomware, meet regulatory obligations (HIPAA, FDA medical device cybersecurity, NERC CIP, CISA zero-trust mandates), and reduce blast radius without a forklift upgrade of their network. Third, candidates are expected to appreciate that because Elisity enforces on third-party network gear, partnership with Cisco, Arista, Aruba, Juniper, and Extreme Networks channels, and with MSSPs, is a core part of the go-to-market motion.
Which verticals should candidates focus on, and why is healthcare so prominent?
Elisity has been publicly associated with healthcare, manufacturing and operational technology (OT), government and critical infrastructure, financial services, and retail. Healthcare is particularly visible for structural reasons. Hospitals operate heterogeneous networks with tens of thousands of connected medical devices, IoT endpoints, and legacy systems; ransomware campaigns have repeatedly targeted hospital systems, including the 2024 Change Healthcare and Ascension incidents; HIPAA obligations and the 2023 FDA medical device cybersecurity requirements (widely referenced as the PATCH Act) require hospitals and device manufacturers to demonstrate segmentation and lifecycle security; and hospitals typically cannot deploy endpoint agents on medical devices. That combination makes agentless identity-based microsegmentation especially well-suited to healthcare. Candidates interviewing for product, engineering, sales, customer success, or marketing roles tied to healthcare should be prepared to discuss this context in substantive detail. Similar structural arguments apply to manufacturing (OT and ICS), utilities (NERC CIP), and federal civilian and defense agencies (CISA zero-trust mandates).
How does Elisity compare to Illumio, Akamai Guardicore, Zero Networks, ColorTokens, and VMware NSX?
Illumio is widely viewed as the market-leading enterprise microsegmentation vendor and has historically emphasized an endpoint-agent model for server and workload segmentation, now extending into additional surfaces; Akamai Guardicore Segmentation (Guardicore was acquired by Akamai in 2021) likewise has a strong heritage in agent-based microsegmentation; Zero Networks and Airgap Networks are newer entrants with different architectural takes on agentless or gateway-based segmentation; ColorTokens plays across segmentation and broader zero-trust; VMware NSX is the dominant network virtualization and microsegmentation platform inside VMware-defined data centers. Elisity differentiates by focusing on agentless, identity-driven microsegmentation for enterprise LAN and OT environments, enforced on existing network gear from Cisco, Arista, Aruba, Juniper, and Extreme Networks, and tightly integrated with Active Directory, Microsoft Entra ID, Okta, and ServiceNow. Candidates interviewing for sales, product, marketing, and customer success roles should be able to articulate these differences honestly rather than rely on marketing-slogan-level positioning, because enterprise cybersecurity buyers evaluate microsegmentation choices carefully and interviewers will probe.
How should candidates think about the 2024 Cisco Hypershield announcement?
In 2024 Cisco announced Cisco Hypershield, a security fabric positioned to deliver distributed enforcement across data centers, clouds, and eventually networks. For a company like Elisity, which enforces segmentation on Cisco infrastructure among other platforms, Hypershield is both a partnership surface and a competitive signal. Interviewers may ask how you think about differentiation when the largest incumbent networking vendor is investing heavily in adjacent territory. Credible answers engage with specifics: Elisity is multi-vendor across Cisco, Arista, Aruba, Juniper, and Extreme Networks; it is agentless and identity-first; it is purpose-built for enterprise LAN and OT rather than primarily for data-center workload protection; and it targets verticals (healthcare, OT, federal, utilities) where deployment simplicity and operational safety matter more than raw fabric scale. Candidates should not attempt to dismiss Cisco; they should engage with the strategic reality respectfully.
How does Elisity handle the security of its own platform?
Because Elisity sits on the critical path of customer network policy enforcement and has visibility into sensitive IT and OT asset inventories, vendor security is a first-class product concern. Candidates for engineering, security, DevOps, and site reliability roles should expect conversations about authentication, authorization, secrets management, audit logging, supply-chain security (SBOM, signed artifacts, reproducible builds), tenant isolation in a multi-tenant control plane, and incident response discipline. Candidates for compliance, legal, and customer-facing roles should expect conversations about frameworks that enterprise buyers require, including SOC 2 (and often SOC 2 Type II), ISO / IEC 27001, HIPAA technical safeguards where healthcare customers are involved, and FedRAMP or StateRAMP posture where federal and state government customers are in scope. Specific current certification status should be confirmed with the recruiter and the security team during the interview, since compliance roadmaps evolve.
How should candidates think about the CISA Zero Trust Maturity Model and NIST SP 800-207?
The United States Cybersecurity and Infrastructure Security Agency (CISA) publishes a Zero Trust Maturity Model (currently version 2.0, released 2023) that defines five pillars (Identity, Devices, Networks, Applications and Workloads, and Data) and four maturity stages (Traditional, Initial, Advanced, and Optimal). NIST Special Publication 800-207 on Zero Trust Architecture (2020) is the foundational United States government reference for zero-trust principles. Elisity's identity-based microsegmentation is directly aligned with the Networks pillar and contributes meaningfully to the Identity and Devices pillars. Candidates for product, engineering, sales, marketing, and customer success roles who can speak fluently about the CISA and NIST frameworks and explain how Elisity's platform helps customers progress along those maturity stages tend to hold more substantive conversations with interviewers. This is especially true for roles that touch federal civilian agencies, defense contractors, state and local government, and CIP / NERC-regulated utilities.
What should candidates expect about equity, liquidity, and the private-company reality?
Elisity is a privately held cybersecurity startup, not a publicly traded company. Equity grants are private-company stock options or restricted units that typically vest over four years with a one-year cliff; there is no public market to sell shares, and liquidity for private-company equity is realized only on an acquisition, an initial public offering, or a private tender offer if the company chooses to organize one. Candidates evaluating offers should treat private-company equity as a potential future upside rather than guaranteed compensation, should ask for the current 409A valuation or reasonable framing of fair market value if comfortable doing so, and should weigh base salary, on-target earnings (where applicable), benefits, and equity together. Candidates whose financial situation requires predictable cash compensation should be especially clear-eyed about base and variable pay during negotiations. Elisity, like most cybersecurity startups, competes for talent against well-funded incumbents (Cisco, Palo Alto Networks, CrowdStrike, Zscaler, SentinelOne) that offer publicly tradable equity, and candidates should factor that honestly into their decision.
Are there language requirements beyond English, and how should bilingual candidates position themselves?
English is required for all Elisity roles, and the working language across engineering, product, security research, and customer success is United States English. Bilingual skills are not a general requirement but can be directly valuable for specific roles. Spanish and Portuguese are useful for customer-facing roles supporting expansion into Latin American healthcare and industrial customers. German and French are useful for European expansion into regulated industries. Mandarin and Japanese are less commonly required at this stage, but fluency can help with specific customer or partner relationships. Bilingual candidates applying for customer success, sales, sales engineering, or technical marketing roles should call out relevant language fluency explicitly in the resume summary and in the recruiter screen rather than bury it in a skills list.

Open Positions

Elisity currently has 10 open positions.

Check Your Resume Before Applying → View 10 open positions at Elisity

Related Resources

Similar Companies

Related Articles


Sources

  1. Elisity corporate website and careers page
  2. Elisity product overview: Cloud Control Center and IdentityGraph
  3. Elisity leadership page (verify current executive team before interview)
  4. Crunchbase profile: Elisity funding history and investors
  5. CISA Zero Trust Maturity Model version 2.0 (2023)
  6. NIST Special Publication 800-207: Zero Trust Architecture
  7. United States Food and Drug Administration medical device cybersecurity guidance
  8. Dark Reading coverage of microsegmentation and enterprise zero-trust
  9. SC Magazine (SC Media) cybersecurity industry coverage
  10. CSO Online enterprise security coverage
  11. SiliconANGLE coverage of Elisity and cybersecurity startups
  12. Forbes cybersecurity coverage (Change Healthcare, Ascension, and 2024 healthcare ransomware context)
  13. Cisco Hypershield announcement (2024) for network-native security context
  14. Illumio, peer microsegmentation vendor for competitive context
  15. Glassdoor (United States) interview and compensation data for Elisity and peer cybersecurity startups