How it works

disreGUARD isn't a company with employees. It's a cooperative where members own their expertise and share in the outcomes of collective work.

Publish

Members contribute research, write for the blog, and build or maintain open-source projects under the disreGUARD umbrella. You keep doing the security work you'd do anyway — but with the reach and reputation of the co-op behind it.

Consult

Members make themselves available for paid consulting engagements — assessments, architecture reviews, red teams, training, advisory retainers. You set your own availability and choose which engagements to take.

Contribute

When a member's published research, project, or public work leads to a paid engagement, that member is compensated for the lead — whether or not they personally take the engagement.


Who we're looking for

We're open to applications from security practitioners with a research background and demonstrated expertise. You don't need to be an "AI security" specialist — the best prompt injection researchers tend to come from traditional web, application, and infrastructure security.

Strong candidates typically have

  • Published security research — CVEs, conference talks, blog posts, whitepapers, or tool releases that demonstrate original thinking
  • Professional experience in application security, penetration testing, or security engineering
  • Familiarity with web and API security fundamentals — OWASP Top 10, injection classes, authentication/authorization, supply chain security
  • Experience with at least one of: security auditing, bug bounties, CTF competition, or competitive audit platforms
  • Comfort reading and writing code — you should be able to review a codebase, write proof-of-concept exploits, and build tools
  • Clear technical writing — research that isn't communicated well doesn't help defenders

Bonus, but not required

  • Prior work on LLM security, prompt injection, or AI safety
  • Experience with infrastructure security, container security, or capability-based access control
  • Contributions to open-source security tooling
  • Track record on Code4rena, Immunefi, HackerOne, or similar platforms

What we don't need

A resume. A cover letter. A LinkedIn profile. Send us links to your work — research you've published, tools you've built, vulnerabilities you've found, talks you've given. The work speaks for itself.


Apply

Email us with links to your published work and a short note on what you'd want to research or build as a member. That's it.

One requirement: please include at least two examples of work published before 2025 — research, CVEs, talks, tool releases, audit reports, or similar. We're a co-op of humans and we verify it.

apply@disreguard.com