26 - 50 employees
Series A
Enterprise Software / SaaS

GreatHorn Company Overview

GreatHorn's mission is to redefine the email security industry to better protect organizations against advanced email threats like phishing, social engineering attacks, and zero-day malware. Our execution on this mission has driven triple-digit growth for three years in a row, and we’re poised to accelerate that growth in the coming year.

Led by cybersecurity veterans, we solve our customers’ email security struggles with leading-edge technology and a team of dedicated, clever people with a customer-first philosophy. We strictly adhere to (and are proud of) our “No A**holes” policy. If this sounds like a team you’d enjoy working with, we hope you’ll check out our career opportunities!

Read more about us in these features:

Jobs at GreatHorn

2 Jobs Listed
Clear Filters
Position Summary: Senior Full Stack Engineer/Leader  The Opportunity: Leadership at an extremely innovative cloud security startup Must Have Requirements: 8+ years of SW development building highly available enterprise systems 6+ years of full stack development. Experience to include the following:  React: Multi-page web applications using React and Material Python, Golang, NodeJS, etc. Client-side JavaScript, CSS, SQL 4+ years of cloud development experience;...
Software Engineering/QA
GreatHorn is looking for a highly motivated and experienced Pre-Sales / Solutions Engineer, to help us continue to rapidly grow the GreatHorn go-to-market team, handle all technical aspects of the pre-sales lifecycle, and ensure that prospective clients have a positive experience with the GreatHorn email security platform. About You: You are an excellent communicator, love working with prospects at different technical and managerial levels across different industries, and thrive in hypergrowth startup environments. You are excited by the opportunity to interact with...
Sales & Business Development


We’re a team of serial entrepreneurs and cybersecurity veterans, solving a massive problem in an enormous market, and we’re committed to the success of our customers and colleagues.

From the accuracy and ease of deployment of our product, to our community of customers and colleagues, “be better than expected” is our motto, and we live and celebrate it.

Our diverse backgrounds and collaborative, creative, passionate approach to problem solving means that we rally around a culture that values teamwork, attention to detail, hard work, and innovation.

Integrity, honesty, and follow-through are fundamental to who we are, and our commitment to uphold our values underscores everything we do. We believe strongly in diversity, and seek to recognize, develop and support talent from all backgrounds.


No A**holes
Ask Questions
Details Matter
Experiment, Then Iterate
Be A Team
Power Through
260 Charles St
Waltham, MA 02453


September 15, 2020
As more employees work remotely, the more an organization’s vital infrastructure is at risk for cyber crime. Domain-based Message Authentication Reporting and Conformance (DMARC) is a free and open technical specification that is used to authenticate email and provide domain users with oversight and control on how their email domains are being used. A DMARC […] The post DMARC – Control Your Email Domains appeared first on GreatHorn. ...
September 10, 2020
Phishing attacks grow more sophisticated with each passing year. As technology advances, so does the opportunity for threats – such as with machine learning or deep fakes. And with increases in working from home, it’s no surprise that threats would increase. The only way to combat phishing and other attacks in the inbox is to […] The post Layering Security Awareness into Your Email Security Approach appeared first on GreatHorn. ...
September 8, 2020
Advanced threat detection for phishing attacks is important to protecting your organization and goes beyond just the basic security analysis and features. You have likely heard about or encounter some of these phishing attacks. There are four primary areas in which advanced threat detection is needed: (1) impersonations, (2) content, (3) malicious payloads, and (4) credential theft. Advanced threat detection solutions are specifically designed to detect more sophisticated attac...
September 1, 2020
Phishing has long been the choice method for hackers and threat actors. Why? Well, it is easy to pull off and costs little to nothing financially. On top of that, it works. Phishers tend to play on one of the biggest vulnerabilities: human emotions and probable reactions. Sending an urgent request from a fake account created with a supervisor or company […] The post What You Should Know about the State of Phishing Attacks in 2020 appeared first on GreatHorn. ...
August 20, 2020
In phishing, the goal is to steal individuals’ bank, credit card, and personal details so they can be sold off on the black market. Easy and fast money is usually the goal for the cybercriminal. If you ask most people, they’d likely tell you they could identify a phish when reading through their emails. Of […] The post How Well Can You Catch a Phish? appeared first on GreatHorn. ...