
We're Hiring
We're Hiring
Join the Team Building AI-Driven Agentic
Email Security
Join the Team Building AI-Driven Agentic
Email Security
Himaya is a small team solving a massive problem. Email is still the number one attack vector globally, and the tools defending it haven't fundamentally changed in a decade. We're changing that with autonomous AI that reasons about threats, makes decisions, and learns from every email it processes. If you want to build something that protects real organizations from real attacks, not another dashboard nobody checks, this is the place.
Himaya is a small team solving a massive problem. Email is still the number one attack vector globally, and the tools defending it haven't fundamentally changed in a decade. We're changing that with autonomous AI that reasons about threats, makes decisions, and learns from every email it processes. If you want to build something that protects real organizations from real attacks, not another dashboard nobody checks, this is the place.
Competitive Compensation
Equity for key roles
Remote-friendly culture
Flexible Time Off
Open Positions
Member of Technical Staff (Sr. SDE), Platform Engineering
Location
India (Remote)
Working Opportunity
Full-time
Salary Range
₹40L – ₹45L per annum + 0.50% – 1% ESOP
Key Responsibilities
Summary:
You'll own the full backend and frontend of Helios -the API, the database, the M365 and Google Workspace integrations, the deployment pipeline, and everything that keeps a production AI security platform running reliably for enterprise customers.
What you'll own:
FastAPI backend powering all Helios API surfaces: threats, quarantine, policies, compliance, message trace, people, admin, and onboarding
M365 Graph API and Google Workspace (DWD) integration layers: delta sync, baseline ingestion, OAuth token refresh, and physical quarantine moves
Next.js App Router frontend: threat feed, quarantine UI, compliance dashboard, admin portal, reporting, and real-time event panels
PostgreSQL schema, migrations, and query performance, including multi-tenant org isolation across every table
CI/CD pipeline via CodeBuild or GitHub Actions, replacing the current manual ECS deploy flow
Stripe billing integration, subscription, and usage metering model
SIEM export connectors for Microsoft Sentinel and Splunk, plus automated remediation playbook infrastructure
Security hardening across JWT secret management, credential vaulting, and cross-tenant data access auditing
ECS operational reliability: Redis hygiene, CloudFront cache invalidation, and ALB configuration
Requirements
7+ years of professional software engineering with 3+ years as a senior IC owning production systems
Expert Python: async patterns, FastAPI, SQLAlchemy async, Pydantic, and background workers
Strong TypeScript and React: Next.js App Router, server components, and real-time patterns
PostgreSQL at scale: schema design, indexing, query planning, and multi-tenant row-level isolation
AWS fluency across ECS Fargate, RDS, ElastiCache, SES, SQS, S3, ACM, and CloudFront
Microsoft Graph API or Google Workspace API production integration experience
Email authentication fundamentals: SPF, DKIM, DMARC, and mail transport mechanics
Stripe or equivalent: subscription billing, usage metering, and webhook handling
Nice to have:
GCC market SaaS experience
Neo4j
Redis advanced patterns
Security engineering background
Member of Technical Staff (Sr. AI/ML Engineer), Threat Detection & Agentic Systems
Location
India (Remote)
Working Opportunity
Full-time
Salary Range
₹45L – ₹55L per annum + Equity: 1% – 1.5%
Key Responsibilities
Summary:
You'll own the intelligence layer of Helios end to end -the agentic detection pipeline, the auto-triage engine, the LLM orchestration, the sender reputation graph, and the Arabic NLP and DLP systems that make Helios reason about threats rather than just classify them.
What you'll own:
The agentic pipeline: Content Classifier, Sender Reputation Agent, and Risk Orchestrator, including decision logic for when to invoke cloud-based LLM versus run locally
Content classification model tuned for phishing, BEC, malware, credential harvesting, account takeover, and spam with Gulf-specific and Arabic language coverage
Auto-triage service (Helios Analysis): the per-org background loop that runs VirusTotal lookups, threat feed checks, Neo4j graph queries, and attachment heuristics, then submits a full dossier to Claude for a structured verdict
All LLM prompts and system prompts: structured JSON output, reasoning quality, and token cost optimization
DLP and data classification engine detecting IBAN numbers, passport data, PII, and product IP in outbound email flows aligned to SAMA, NCA ECC, and PDPL
Neo4j sender reputation graph: sender-recipient history, domain spread detection, lateral movement signals, and threat clustering
Composite risk scoring model: content, auth, graph, reputation, and urgency scores with continuous calibration against false positive feedback
Feedback loop pipeline where analyst false positive reports and quarantine decisions feed back into model training
Arabic NLP pipeline with Gulf dialect awareness, transliteration handling, and manipulation pattern detection
Requirements
Required:
6+ years AI/ML engineering with 2+ years working with LLMs in production at a meaningful scale
Deep LLM orchestration experience: prompt engineering, structured outputs, chain-of-thought reasoning, confidence scoring, and cost and latency optimization using Claude or equivalent
Agentic and multi-agent system experience: sequential pipelines, tool-use patterns, autonomous decision loops, and human-in-the-loop escalation design
Proficient async Python: FastAPI background workers and Pydantic for LLM output validation
NLP fundamentals: text classification, embeddings, and feature engineering on email metadata
Neo4j or equivalent graph database: Cypher queries and graph-based scoring signals
Threat intelligence API integration experience with VirusTotal or STIX/TAXII feeds
Strong ML evaluation instincts: building eval sets, tracking precision and recall, managing threshold decisions, and debugging false positive patterns
Nice to have:
Arabic NLP
Email security domain knowledge
LangGraph or LangChain
QA Architect
Location
India (Remote)
Working Opportunity
Full-time
Salary Range
₹20L – ₹30L per annum Equity: 0.15% – 0.25% ESOP
Key Responsibilities
Summary:
You'll design and own the testing infrastructure for an autonomous AI security platform that makes real-time decisions on live enterprise email -building the evaluation frameworks, pipeline quality tests, and CI/CD quality gates that give the team confidence to ship.
What you'll own:
Design and own the end-to-end test architecture for Helios: unit, integration, API contract, E2E, and AI pipeline quality testing
Automated test suite for all backend API surfaces via pytest, covering the threat detection pipeline, quarantine service, policy engine, compliance worker, onboarding flows, and admin endpoints
AI pipeline evaluation framework: building canonical labeled threat datasets across phishing, BEC, malware, credential harvesting, spam, and clean email, then running precision and recall benchmarks against every pipeline change
Threat injection framework: the production-readiness test harness that fires canonical threat scenarios through the full pipeline and validates auto-triage outcomes within defined SLA windows
E2E test coverage for the Next.js frontend via Playwright or Cypress, covering critical user journeys: threat triage, quarantine release, compliance export, M365 and Google Workspace onboarding, and policy configuration
Quality gates in the CI/CD pipeline: no merge without coverage thresholds, no deploy without a smoke test pass
Regression test suites that catch changes in AI scoring behavior when prompts, thresholds, or model versions change
Load and performance test strategy validating that the threat detection pipeline holds sub-800ms p99 latency under realistic email volume
Quality documentation: test plans, coverage reports, flaky test tracking, and QA runbooks for production incidents
Requirements
Required:
7+ years of software QA engineering with 3+ years in a QA architecture or lead role
Deep pytest expertise: fixtures, parametrize, async testing, mocking FastAPI dependencies, and test database setup and teardown
API testing at scale: complex REST APIs with authentication, multi-tenant isolation, background workers, and async side effects
E2E testing via Playwright or Cypress for modern Next.js applications including real-time UI updates and async backend flows
AI and ML system testing experience: understanding that non-deterministic outputs require evaluation frameworks rather than exact-match assertions
CI/CD integration via GitHub Actions or AWS CodeBuild with quality gates, coverage enforcement, and test parallelization
Performance and load testing with k6, Locust, or similar: defining SLAs and validating them under realistic load
Strong understanding of multi-tenant SaaS testing patterns: data isolation, tenant-scoped fixtures, and cross-tenant contamination testing
Nice to have:
Security domain testing experience
Neo4j testing
Redis state testing in integration tests
Contract testing with Pact or similar
Experience building ML eval datasets
Technical Support Engineer
Location
UAE/USA (Remote)
Working Opportunity
Full-time
Salary Range
$80,000 - $90,000 per year + Equity: 0.50% – 1% ESOP
Key Responsibilities
Summary:
You'll be the first technical point of contact for Himaya's enterprise customers -helping them onboard, diagnosing integration issues, interpreting AI threat verdicts, and making sure the platform is working exactly as it should in their environment.
What you'll own:
The customer support queue: triaging, investigating, and resolving technical issues across Helios onboarding, integrations, threat detection, quarantine, policies, compliance, and billing
Guiding customers through M365 Graph API connector setup, Google Workspace Domain-Wide Delegation configuration, and OAuth token troubleshooting
Diagnosing and resolving delta sync issues: investigating last_sync_at gaps, baseline ingestion failures, mailbox connector errors, and M365 token expiry
Helping customers interpret AI threat verdicts: explaining why an email was quarantined, what the risk score components mean, and how to tune thresholds and policies to reduce false positives
Investigating and escalating production issues: reading ECS logs via CloudWatch, tracing threat records in PostgreSQL, identifying Redis or queue issues, and writing clear reproduction steps for engineering
Customer-facing documentation: onboarding guides, integration setup walkthroughs, policy configuration playbooks, FAQ articles, and compliance report interpretation guides
Technical onboarding calls with new customers: walking security teams through the Helios dashboard, auto-triage configuration, VIP protection setup, and compliance control status
Tracking and reporting recurring support patterns to identify platform gaps and onboarding friction for the product team
Supporting GCC regulatory compliance inquiries: helping customers understand how Helios maps to SAMA, NCA ECC, and PDPL requirements
Requirements
Required:
3 to 5 years of technical support engineering or solutions engineering at a SaaS or security product company
Strong working knowledge of Microsoft 365 administration: Exchange Online, security and compliance center, OAuth app registration, and Graph API basics
Familiarity with Google Workspace administration: Gmail settings, Admin Console, API controls, and DWD concepts
Email authentication fundamentals: SPF, DKIM, and DMARC with the ability to read and interpret email headers and explain authentication failures to customers
Ability to read application logs and trace issues across a multi-service stack without needing to write backend code
Clear written and verbal communication in English for both documentation and enterprise customer calls
Customer-facing experience managing enterprise expectations, escalating appropriately, and owning issues to resolution
Nice to have:
Arabic language ability
AWS CloudWatch log querying
Basic Python
Cybersecurity concepts
Open Positions
Open Positions
Member of Technical Staff (Sr. SDE), Platform Engineering
Location
India (Remote)
Working Opportunity
Full-time
Salary Range
₹40L – ₹45L per annum + 0.50% – 1% ESOP
Key Responsibilities
Summary:
You'll own the full backend and frontend of Helios -the API, the database, the M365 and Google Workspace integrations, the deployment pipeline, and everything that keeps a production AI security platform running reliably for enterprise customers.
What you'll own:
FastAPI backend powering all Helios API surfaces: threats, quarantine, policies, compliance, message trace, people, admin, and onboarding
M365 Graph API and Google Workspace (DWD) integration layers: delta sync, baseline ingestion, OAuth token refresh, and physical quarantine moves
Next.js App Router frontend: threat feed, quarantine UI, compliance dashboard, admin portal, reporting, and real-time event panels
PostgreSQL schema, migrations, and query performance, including multi-tenant org isolation across every table
CI/CD pipeline via CodeBuild or GitHub Actions, replacing the current manual ECS deploy flow
Stripe billing integration, subscription, and usage metering model
SIEM export connectors for Microsoft Sentinel and Splunk, plus automated remediation playbook infrastructure
Security hardening across JWT secret management, credential vaulting, and cross-tenant data access auditing
ECS operational reliability: Redis hygiene, CloudFront cache invalidation, and ALB configuration
Requirements
7+ years of professional software engineering with 3+ years as a senior IC owning production systems
Expert Python: async patterns, FastAPI, SQLAlchemy async, Pydantic, and background workers
Strong TypeScript and React: Next.js App Router, server components, and real-time patterns
PostgreSQL at scale: schema design, indexing, query planning, and multi-tenant row-level isolation
AWS fluency across ECS Fargate, RDS, ElastiCache, SES, SQS, S3, ACM, and CloudFront
Microsoft Graph API or Google Workspace API production integration experience
Email authentication fundamentals: SPF, DKIM, DMARC, and mail transport mechanics
Stripe or equivalent: subscription billing, usage metering, and webhook handling
Nice to have:
GCC market SaaS experience
Neo4j
Redis advanced patterns
Security engineering background
Member of Technical Staff (Sr. AI/ML Engineer), Threat Detection & Agentic Systems
Location
India (Remote)
Working Opportunity
Full-time
Salary Range
₹45L – ₹55L per annum + Equity: 1% – 1.5%
Key Responsibilities
Summary:
You'll own the intelligence layer of Helios end to end -the agentic detection pipeline, the auto-triage engine, the LLM orchestration, the sender reputation graph, and the Arabic NLP and DLP systems that make Helios reason about threats rather than just classify them.
What you'll own:
The agentic pipeline: Content Classifier, Sender Reputation Agent, and Risk Orchestrator, including decision logic for when to invoke cloud-based LLM versus run locally
Content classification model tuned for phishing, BEC, malware, credential harvesting, account takeover, and spam with Gulf-specific and Arabic language coverage
Auto-triage service (Helios Analysis): the per-org background loop that runs VirusTotal lookups, threat feed checks, Neo4j graph queries, and attachment heuristics, then submits a full dossier to Claude for a structured verdict
All LLM prompts and system prompts: structured JSON output, reasoning quality, and token cost optimization
DLP and data classification engine detecting IBAN numbers, passport data, PII, and product IP in outbound email flows aligned to SAMA, NCA ECC, and PDPL
Neo4j sender reputation graph: sender-recipient history, domain spread detection, lateral movement signals, and threat clustering
Composite risk scoring model: content, auth, graph, reputation, and urgency scores with continuous calibration against false positive feedback
Feedback loop pipeline where analyst false positive reports and quarantine decisions feed back into model training
Arabic NLP pipeline with Gulf dialect awareness, transliteration handling, and manipulation pattern detection
Requirements
Required:
6+ years AI/ML engineering with 2+ years working with LLMs in production at a meaningful scale
Deep LLM orchestration experience: prompt engineering, structured outputs, chain-of-thought reasoning, confidence scoring, and cost and latency optimization using Claude or equivalent
Agentic and multi-agent system experience: sequential pipelines, tool-use patterns, autonomous decision loops, and human-in-the-loop escalation design
Proficient async Python: FastAPI background workers and Pydantic for LLM output validation
NLP fundamentals: text classification, embeddings, and feature engineering on email metadata
Neo4j or equivalent graph database: Cypher queries and graph-based scoring signals
Threat intelligence API integration experience with VirusTotal or STIX/TAXII feeds
Strong ML evaluation instincts: building eval sets, tracking precision and recall, managing threshold decisions, and debugging false positive patterns
Nice to have:
Arabic NLP
Email security domain knowledge
LangGraph or LangChain
QA Architect
Location
India (Remote)
Working Opportunity
Full-time
Salary Range
₹20L – ₹30L per annum Equity: 0.15% – 0.25% ESOP
Key Responsibilities
Summary:
You'll design and own the testing infrastructure for an autonomous AI security platform that makes real-time decisions on live enterprise email -building the evaluation frameworks, pipeline quality tests, and CI/CD quality gates that give the team confidence to ship.
What you'll own:
Design and own the end-to-end test architecture for Helios: unit, integration, API contract, E2E, and AI pipeline quality testing
Automated test suite for all backend API surfaces via pytest, covering the threat detection pipeline, quarantine service, policy engine, compliance worker, onboarding flows, and admin endpoints
AI pipeline evaluation framework: building canonical labeled threat datasets across phishing, BEC, malware, credential harvesting, spam, and clean email, then running precision and recall benchmarks against every pipeline change
Threat injection framework: the production-readiness test harness that fires canonical threat scenarios through the full pipeline and validates auto-triage outcomes within defined SLA windows
E2E test coverage for the Next.js frontend via Playwright or Cypress, covering critical user journeys: threat triage, quarantine release, compliance export, M365 and Google Workspace onboarding, and policy configuration
Quality gates in the CI/CD pipeline: no merge without coverage thresholds, no deploy without a smoke test pass
Regression test suites that catch changes in AI scoring behavior when prompts, thresholds, or model versions change
Load and performance test strategy validating that the threat detection pipeline holds sub-800ms p99 latency under realistic email volume
Quality documentation: test plans, coverage reports, flaky test tracking, and QA runbooks for production incidents
Requirements
Required:
7+ years of software QA engineering with 3+ years in a QA architecture or lead role
Deep pytest expertise: fixtures, parametrize, async testing, mocking FastAPI dependencies, and test database setup and teardown
API testing at scale: complex REST APIs with authentication, multi-tenant isolation, background workers, and async side effects
E2E testing via Playwright or Cypress for modern Next.js applications including real-time UI updates and async backend flows
AI and ML system testing experience: understanding that non-deterministic outputs require evaluation frameworks rather than exact-match assertions
CI/CD integration via GitHub Actions or AWS CodeBuild with quality gates, coverage enforcement, and test parallelization
Performance and load testing with k6, Locust, or similar: defining SLAs and validating them under realistic load
Strong understanding of multi-tenant SaaS testing patterns: data isolation, tenant-scoped fixtures, and cross-tenant contamination testing
Nice to have:
Security domain testing experience
Neo4j testing
Redis state testing in integration tests
Contract testing with Pact or similar
Experience building ML eval datasets
Technical Support Engineer
Location
UAE/USA (Remote)
Working Opportunity
Full-time
Salary Range
$80,000 - $90,000 per year + Equity: 0.50% – 1% ESOP
Key Responsibilities
Summary:
You'll be the first technical point of contact for Himaya's enterprise customers -helping them onboard, diagnosing integration issues, interpreting AI threat verdicts, and making sure the platform is working exactly as it should in their environment.
What you'll own:
The customer support queue: triaging, investigating, and resolving technical issues across Helios onboarding, integrations, threat detection, quarantine, policies, compliance, and billing
Guiding customers through M365 Graph API connector setup, Google Workspace Domain-Wide Delegation configuration, and OAuth token troubleshooting
Diagnosing and resolving delta sync issues: investigating last_sync_at gaps, baseline ingestion failures, mailbox connector errors, and M365 token expiry
Helping customers interpret AI threat verdicts: explaining why an email was quarantined, what the risk score components mean, and how to tune thresholds and policies to reduce false positives
Investigating and escalating production issues: reading ECS logs via CloudWatch, tracing threat records in PostgreSQL, identifying Redis or queue issues, and writing clear reproduction steps for engineering
Customer-facing documentation: onboarding guides, integration setup walkthroughs, policy configuration playbooks, FAQ articles, and compliance report interpretation guides
Technical onboarding calls with new customers: walking security teams through the Helios dashboard, auto-triage configuration, VIP protection setup, and compliance control status
Tracking and reporting recurring support patterns to identify platform gaps and onboarding friction for the product team
Supporting GCC regulatory compliance inquiries: helping customers understand how Helios maps to SAMA, NCA ECC, and PDPL requirements
Requirements
Required:
3 to 5 years of technical support engineering or solutions engineering at a SaaS or security product company
Strong working knowledge of Microsoft 365 administration: Exchange Online, security and compliance center, OAuth app registration, and Graph API basics
Familiarity with Google Workspace administration: Gmail settings, Admin Console, API controls, and DWD concepts
Email authentication fundamentals: SPF, DKIM, and DMARC with the ability to read and interpret email headers and explain authentication failures to customers
Ability to read application logs and trace issues across a multi-service stack without needing to write backend code
Clear written and verbal communication in English for both documentation and enterprise customer calls
Customer-facing experience managing enterprise expectations, escalating appropriately, and owning issues to resolution
Nice to have:
Arabic language ability
AWS CloudWatch log querying
Basic Python
Cybersecurity concepts
Member of Technical Staff (Sr. SDE), Platform Engineering
Location
India (Remote)
Working Opportunity
Full-time
Salary Range
₹40L – ₹45L per annum + 0.50% – 1% ESOP
Key Responsibilities
Summary:
You'll own the full backend and frontend of Helios -the API, the database, the M365 and Google Workspace integrations, the deployment pipeline, and everything that keeps a production AI security platform running reliably for enterprise customers.
What you'll own:
FastAPI backend powering all Helios API surfaces: threats, quarantine, policies, compliance, message trace, people, admin, and onboarding
M365 Graph API and Google Workspace (DWD) integration layers: delta sync, baseline ingestion, OAuth token refresh, and physical quarantine moves
Next.js App Router frontend: threat feed, quarantine UI, compliance dashboard, admin portal, reporting, and real-time event panels
PostgreSQL schema, migrations, and query performance, including multi-tenant org isolation across every table
CI/CD pipeline via CodeBuild or GitHub Actions, replacing the current manual ECS deploy flow
Stripe billing integration, subscription, and usage metering model
SIEM export connectors for Microsoft Sentinel and Splunk, plus automated remediation playbook infrastructure
Security hardening across JWT secret management, credential vaulting, and cross-tenant data access auditing
ECS operational reliability: Redis hygiene, CloudFront cache invalidation, and ALB configuration
Requirements
7+ years of professional software engineering with 3+ years as a senior IC owning production systems
Expert Python: async patterns, FastAPI, SQLAlchemy async, Pydantic, and background workers
Strong TypeScript and React: Next.js App Router, server components, and real-time patterns
PostgreSQL at scale: schema design, indexing, query planning, and multi-tenant row-level isolation
AWS fluency across ECS Fargate, RDS, ElastiCache, SES, SQS, S3, ACM, and CloudFront
Microsoft Graph API or Google Workspace API production integration experience
Email authentication fundamentals: SPF, DKIM, DMARC, and mail transport mechanics
Stripe or equivalent: subscription billing, usage metering, and webhook handling
Nice to have:
GCC market SaaS experience
Neo4j
Redis advanced patterns
Security engineering background
Member of Technical Staff (Sr. AI/ML Engineer), Threat Detection & Agentic Systems
Location
India (Remote)
Working Opportunity
Full-time
Salary Range
₹45L – ₹55L per annum + Equity: 1% – 1.5%
Key Responsibilities
Summary:
You'll own the intelligence layer of Helios end to end -the agentic detection pipeline, the auto-triage engine, the LLM orchestration, the sender reputation graph, and the Arabic NLP and DLP systems that make Helios reason about threats rather than just classify them.
What you'll own:
The agentic pipeline: Content Classifier, Sender Reputation Agent, and Risk Orchestrator, including decision logic for when to invoke cloud-based LLM versus run locally
Content classification model tuned for phishing, BEC, malware, credential harvesting, account takeover, and spam with Gulf-specific and Arabic language coverage
Auto-triage service (Helios Analysis): the per-org background loop that runs VirusTotal lookups, threat feed checks, Neo4j graph queries, and attachment heuristics, then submits a full dossier to Claude for a structured verdict
All LLM prompts and system prompts: structured JSON output, reasoning quality, and token cost optimization
DLP and data classification engine detecting IBAN numbers, passport data, PII, and product IP in outbound email flows aligned to SAMA, NCA ECC, and PDPL
Neo4j sender reputation graph: sender-recipient history, domain spread detection, lateral movement signals, and threat clustering
Composite risk scoring model: content, auth, graph, reputation, and urgency scores with continuous calibration against false positive feedback
Feedback loop pipeline where analyst false positive reports and quarantine decisions feed back into model training
Arabic NLP pipeline with Gulf dialect awareness, transliteration handling, and manipulation pattern detection
Requirements
Required:
6+ years AI/ML engineering with 2+ years working with LLMs in production at a meaningful scale
Deep LLM orchestration experience: prompt engineering, structured outputs, chain-of-thought reasoning, confidence scoring, and cost and latency optimization using Claude or equivalent
Agentic and multi-agent system experience: sequential pipelines, tool-use patterns, autonomous decision loops, and human-in-the-loop escalation design
Proficient async Python: FastAPI background workers and Pydantic for LLM output validation
NLP fundamentals: text classification, embeddings, and feature engineering on email metadata
Neo4j or equivalent graph database: Cypher queries and graph-based scoring signals
Threat intelligence API integration experience with VirusTotal or STIX/TAXII feeds
Strong ML evaluation instincts: building eval sets, tracking precision and recall, managing threshold decisions, and debugging false positive patterns
Nice to have:
Arabic NLP
Email security domain knowledge
LangGraph or LangChain
QA Architect
Location
India (Remote)
Working Opportunity
Full-time
Salary Range
₹20L – ₹30L per annum Equity: 0.15% – 0.25% ESOP
Key Responsibilities
Summary:
You'll design and own the testing infrastructure for an autonomous AI security platform that makes real-time decisions on live enterprise email -building the evaluation frameworks, pipeline quality tests, and CI/CD quality gates that give the team confidence to ship.
What you'll own:
Design and own the end-to-end test architecture for Helios: unit, integration, API contract, E2E, and AI pipeline quality testing
Automated test suite for all backend API surfaces via pytest, covering the threat detection pipeline, quarantine service, policy engine, compliance worker, onboarding flows, and admin endpoints
AI pipeline evaluation framework: building canonical labeled threat datasets across phishing, BEC, malware, credential harvesting, spam, and clean email, then running precision and recall benchmarks against every pipeline change
Threat injection framework: the production-readiness test harness that fires canonical threat scenarios through the full pipeline and validates auto-triage outcomes within defined SLA windows
E2E test coverage for the Next.js frontend via Playwright or Cypress, covering critical user journeys: threat triage, quarantine release, compliance export, M365 and Google Workspace onboarding, and policy configuration
Quality gates in the CI/CD pipeline: no merge without coverage thresholds, no deploy without a smoke test pass
Regression test suites that catch changes in AI scoring behavior when prompts, thresholds, or model versions change
Load and performance test strategy validating that the threat detection pipeline holds sub-800ms p99 latency under realistic email volume
Quality documentation: test plans, coverage reports, flaky test tracking, and QA runbooks for production incidents
Requirements
Required:
7+ years of software QA engineering with 3+ years in a QA architecture or lead role
Deep pytest expertise: fixtures, parametrize, async testing, mocking FastAPI dependencies, and test database setup and teardown
API testing at scale: complex REST APIs with authentication, multi-tenant isolation, background workers, and async side effects
E2E testing via Playwright or Cypress for modern Next.js applications including real-time UI updates and async backend flows
AI and ML system testing experience: understanding that non-deterministic outputs require evaluation frameworks rather than exact-match assertions
CI/CD integration via GitHub Actions or AWS CodeBuild with quality gates, coverage enforcement, and test parallelization
Performance and load testing with k6, Locust, or similar: defining SLAs and validating them under realistic load
Strong understanding of multi-tenant SaaS testing patterns: data isolation, tenant-scoped fixtures, and cross-tenant contamination testing
Nice to have:
Security domain testing experience
Neo4j testing
Redis state testing in integration tests
Contract testing with Pact or similar
Experience building ML eval datasets
Technical Support Engineer
Location
UAE/USA (Remote)
Working Opportunity
Full-time
Salary Range
$80,000 - $90,000 per year + Equity: 0.50% – 1% ESOP
Key Responsibilities
Summary:
You'll be the first technical point of contact for Himaya's enterprise customers -helping them onboard, diagnosing integration issues, interpreting AI threat verdicts, and making sure the platform is working exactly as it should in their environment.
What you'll own:
The customer support queue: triaging, investigating, and resolving technical issues across Helios onboarding, integrations, threat detection, quarantine, policies, compliance, and billing
Guiding customers through M365 Graph API connector setup, Google Workspace Domain-Wide Delegation configuration, and OAuth token troubleshooting
Diagnosing and resolving delta sync issues: investigating last_sync_at gaps, baseline ingestion failures, mailbox connector errors, and M365 token expiry
Helping customers interpret AI threat verdicts: explaining why an email was quarantined, what the risk score components mean, and how to tune thresholds and policies to reduce false positives
Investigating and escalating production issues: reading ECS logs via CloudWatch, tracing threat records in PostgreSQL, identifying Redis or queue issues, and writing clear reproduction steps for engineering
Customer-facing documentation: onboarding guides, integration setup walkthroughs, policy configuration playbooks, FAQ articles, and compliance report interpretation guides
Technical onboarding calls with new customers: walking security teams through the Helios dashboard, auto-triage configuration, VIP protection setup, and compliance control status
Tracking and reporting recurring support patterns to identify platform gaps and onboarding friction for the product team
Supporting GCC regulatory compliance inquiries: helping customers understand how Helios maps to SAMA, NCA ECC, and PDPL requirements
Requirements
Required:
3 to 5 years of technical support engineering or solutions engineering at a SaaS or security product company
Strong working knowledge of Microsoft 365 administration: Exchange Online, security and compliance center, OAuth app registration, and Graph API basics
Familiarity with Google Workspace administration: Gmail settings, Admin Console, API controls, and DWD concepts
Email authentication fundamentals: SPF, DKIM, and DMARC with the ability to read and interpret email headers and explain authentication failures to customers
Ability to read application logs and trace issues across a multi-service stack without needing to write backend code
Clear written and verbal communication in English for both documentation and enterprise customer calls
Customer-facing experience managing enterprise expectations, escalating appropriately, and owning issues to resolution
Nice to have:
Arabic language ability
AWS CloudWatch log querying
Basic Python
Cybersecurity concepts
