Contribute something unique about Orca Security that may be helpful for others (ex. interview tips, choosing teams, unique culture, etc).
Orcaβs cloud security solution deploys in minutes and identifies vulnerabilities, malware, misconfigurations, secret keys, leaked passwords, lateral movement risk, and high-risk data such as PII.
Compensation from verified offer letters & W2 statements emailed to you bi-weekly! Learn More β