The only tool you need for hiring cybersecurity experts
Watch candidates configure firewalls, patch vulnerabilities and investigate intrusions all within a live and immersive terminal environment
Made For High Stakes Hiring
Predict real job performance and make great hiring decisions
Don’t risk mishiring when it comes to your incident response and cybersecurity. Validate skills within a virtual environment where candidates perform common tasks associated with the roles they are applying for. For example: See a candidate setup ssh-guard and use a bastion host, while ensuring that its systems logs are visible remotely.
Evaluates Soft Skills for A Complete Profile
Validate skills with real-world cybersecurity tasks
While the cybersecurity simulator supports testing across hundreds of use cases; assessment scenario content is responsive to these use cases by also testing a range of soft skills required for success in cybersecurity like attention to detail, problem solving, communication and risk management through common scenarios faced on the job.
Intuitive Scoring & Analysis
Make shortlisting a breeze with auto gradable technical tasks
Intuitive scoring and rich candidate profiles allow you to understand a candidate’s skill without spending hours reviewing take home tasks. Check if key commands were passed or failed at a glance or dive deeper into simulation outputs and artefacts.
Supports All Levels And Role Types
These simulations currently support testing across three levels of difficulty
All simulations carry a difficulty status out of 5 and cover the most popular role types.
We’re constantly developing the new cybersecurity simulations. Can’t find what you need? Let us know below what you’d like to see next for any role or use case.
Launching soon are more technical simulations to help you hire across a range of roles and job types including Network Engineering (Cisco), DevOps, Linux and Windows Administration and Cloud simulations.
Want To Have Your Say
On What We Build Next?
Your Cybersimulation Idea, Brought To Life.
Have an idea for our next set of cybersecurity simulation use cases?
We want to hear from you – the best of the best in industry to build our new use cases. Let us know in the form and get early access to the next set of simulations we build!
Some inspiration on use cases we've shortlisted for development:
- Third Party & Supply Chain Cyber Risk
- Data & Information Protection
- Managing security in a Hybrid Work Environment
- Authentication, Certificates and Encryption Key Management
- Windows Security
CYBERSECURITY SIMULATION PLATFORM
Frequently asked questions
A cybersecurity simulation is a fully immersive experience designed to test a candidate’s skills. Unlike many other market offerings, our job simulations are the first of their kind to place candidates in a “simulation” that mimics the same systems used in their potential future employment, such as Linux.
In this case, candidates are required to run a series of commands to achieve specific outcomes, such as blocking a firewall, or identifying risks and patterns through failed logins to prevent hacking or data breaches. Upon completion, hiring managers are therefore able to make data driven decisions and identify the most talented candidates.
The cybersecurity job simulations can be used to assess the real-world technical and soft skills of candidates for various roles within this field. To help you get started, we’ve added several different junior to midweight roles to our public skills assessment library.
These can be found under the new network and cybersecurity category in-app:
- Network Engineer
- System Administrator
- Cyber Security Officer
- Cyber Security Analyst
- Technology Risk Analyst
Cybersecurity simulations give candidates access to real, live hosts in a cloud environment. Candidates are then required to configure systems and applications and perform tasks in a live environment.
The initial cybersecurity simulations support testing across a variety of use cases, while assessment scenario content is responsive to these use cases by also testing a range of soft skills required for success in cybersecurity and network security.
In simple terms, cybersecurity simulations are the closest way a hiring manager or recruiter can get to seeing someone do the job, before they get the job. You shouldn’t have to be an expert in order to hire an expert, so they’re also particularly helpful if you’re recruiting for these roles and aren’t particularly technical yourself.
Each simulation has a series of tasks that the candidate can either pass or fail that require them to select and use the relevant commands to return the correct output. Each simulation has several opportunities to gain points, so one wrong command doesn’t necessarily mean they’ll fail the whole simulation.
Previously, the technical skills of a cybersecurity expert were assessed using outdated recruitment methods like resume screening, knowledge based job interviews and take home tests. Most of these practices cannot effectively validate the skills that an applicant claimed to possess while take-home tests meant hours of manual review and grading from the employer.
With the influx of candidates without the right skills, like those that have just done an online course, it’s increasingly difficult for companies to validate who can do the work until they’re in the job.
The true power of our cybersecurity job simulations is that there is currently no other platform on the market that has the technical capability to both test and grade a candidate’s responses inside a live terminal. By embracing this technology, recruiters now have the confidence to make effective hiring decisions knowing that they’ve seen someone actually do the work.
Yes! As cybersecurity is a constantly evolving field that’s soaring in demand, we’ll soon be looking to launch more technical simulations to help you hire across a range of roles and job types including Network Engineering (Cisco), DevOps, Linux and Windows Administration and Cloud simulations.
What’s more, is that we are actively seeking feedback from our growing list of clients on what they would like to see us develop next. If there’s a cybersecurity use case that you haven’t seen in our library but would absolutely love to use, let us know and get early access to the next set of simulations that we opt to build.