Join the co-op
Apply to join
disreGUARD is a cooperative of security researchers and engineers. Members publish research, build open-source tools, and take on consulting engagements — together.
How it works
disreGUARD isn't a company with employees. It's a cooperative where members own their expertise and share in the outcomes of collective work.
Publish
Members contribute research, write for the blog, and build or maintain open-source projects under the disreGUARD umbrella. You keep doing the security work you'd do anyway — but with the reach and reputation of the co-op behind it.
Consult
Members make themselves available for paid consulting engagements — assessments, architecture reviews, red teams, training, advisory retainers. You set your own availability and choose which engagements to take.
Contribute
When a member's published research, project, or public work leads to a paid engagement, that member is compensated for the lead — whether or not they personally take the engagement.
Who we're looking for
We're open to applications from security practitioners with a research background and demonstrated expertise. You don't need to be an "AI security" specialist — the best prompt injection researchers tend to come from traditional web, application, and infrastructure security.
Strong candidates typically have
- Published security research — CVEs, conference talks, blog posts, whitepapers, or tool releases that demonstrate original thinking
- Professional experience in application security, penetration testing, or security engineering
- Familiarity with web and API security fundamentals — OWASP Top 10, injection classes, authentication/authorization, supply chain security
- Experience with at least one of: security auditing, bug bounties, CTF competition, or competitive audit platforms
- Comfort reading and writing code — you should be able to review a codebase, write proof-of-concept exploits, and build tools
- Clear technical writing — research that isn't communicated well doesn't help defenders
Bonus, but not required
- Prior work on LLM security, prompt injection, or AI safety
- Experience with infrastructure security, container security, or capability-based access control
- Contributions to open-source security tooling
- Track record on Code4rena, Immunefi, HackerOne, or similar platforms
What we don't need
A resume. A cover letter. A LinkedIn profile. Send us links to your work — research you've published, tools you've built, vulnerabilities you've found, talks you've given. The work speaks for itself.
Apply
Email us with links to your published work and a short note on what you'd want to research or build as a member. That's it.
One requirement: please include at least two examples of work published before 2025 — research, CVEs, talks, tool releases, audit reports, or similar. We're a co-op of humans and we verify it.
apply@disreguard.com