Software Engineer - Backend
Software Engineer - Frontend
Software Engineer - Fullstack
Threat Detection Engineer
Nation states, criminal organizations, and lone wolves attempt to phish businesses, non-profits, and governments 24/7/365. When they succeed it can be extraordinarily destructive, disrupting coronavirus research, impacting a US presidential election, or damaging a country’s national defense. Email is the #1 attack vector, and last year phishing cost US businesses over $9B in direct financial losses.
Security professionals deserve superpowers that make them the heroes in this fight.
Sublime is making email security programmable.
Many companies have tried to solve phishing using black box ML. They've failed for the past 20 years. We're taking a different approach - we've created a DSL to enable security professionals, IT admins, and academic researchers to quickly develop new phishing detection rules. These new, community-built rules can be powered by arbitrary sets of ML models, 3rd party enrichment services, and custom functions. All backed by a GitHub-like system for version control that makes sharing and collaboration easy for the first time ever.
Here's an example of a moderately sophisticated phishing detection rule that is written in Sublime's Message Query Language (MQL):
type.inbound and any(body.links, .href_url.domain.domain in $free_file_hosts) and sender.email.domain.root_domain in $free_email_providers and emailrep(sender.email.email).suspicious and sender.email.email not in $sender_emails
This rule is looking for a common technique used by APT29, the Russian threat group that leaked the DNC emails in 2016.
To see more rule examples and for a deeper dive into Sublime, check out our early access docs.