Join the Parliament
We are building a new kind of security product to protect companies from data breaches, one that is easy for organizations of all sizes to use.
Each one of us is a technologist at heart, excited about the many possibilities of our innovative architecture. What we find most rewarding is creating a company that finally demystifies security, transforming it into an operational tool and making it accessible to DevOps teams.
We are venture funded, and are working closely with some of the largest brands and most innovative startups to help secure their data. We’d love to have you join us on our journey!
Our Owls are Driven by Three Values
At Cyral we value original thinking, teamwork, and taking pride in ownership. Everybody is wholly invested in the company’s success and in delivering a product that our customers love.
We believe in building community, being transparent and never settling.
We strive to create community for those around us—our team members, customers, and partners—while giving back to the security community at large.
We take our commitments and responsibilities seriously. We aim to be a company everyone wants to partner with and work for.
Building a new model for security means we are constantly pushing for the best—from ourselves, our technology, and our execution.
Benefits & Perks
Be a part of building and owning something brand new
Learn about security and sharpen your logic problem solving skills over lunchtime sessions
Open Positions at the Parliament
If you are looking to tackle difficult challenges alongside a cross-disciplinary group of world-class leaders in security and databases, we would be thrilled to meet you! Explore our open positions and find the perfect fit for you.
Good Stewards of our Forest
Cyral employees are not only deeply engaged on a professional level but also on a personal level when it comes to solving big problems and sharing knowledge. We strive to make an impact through ingenuity and education.
We take action on some of the world’s biggest challenges, and we encourage you to join us!
“Webcam was first used by computer scientists to remotely check if their coffee pot was empty.”
“Ada Lovelace is thought of as the first computer programmer. She was the first to recognize that the Analytical Engine had applications beyond pure calculation, and published the first algorithm intended to be carried out by such a machine. It is said that Ada’s mother promoted her daughter’s interest in mathematics and logic to keep her from developing her father Lord Byron’s perceived insanity!”
“I originally became interested in tech because I loved muffinfilms.com and wanted to be able to do that!”
“Dijkstra’s Shortest Path First algorithm was designed in 20 minutes by Edward Djikstra. In about the same time we eat breakfast or lunch, Djikstra invented one of the most influential algorithms in computer science.”
“Margaret Hamilton is credited (along with Anthony Oettinger and Barry Boehm) for coining the term “software engineering” while she worked on the Apollo missions for NASA in the late 1960s. At the time, software development wasn’t considered an engineering discipline, and the successful Apollo landing is in part responsible due to her work in designing and building reliable and resilient software.”
“The first recorded computer ‘bug’ was actually a moth trapped in a relay switch causing it to jam!”
“The first hard drive was invented by IBM. It was the size of two refrigerators and could store 5MB of data.”
“The password of the computers in charge of controlling the nuclear missiles of the United States Army was 0000000000 for years.”
“In the 1960’s, you could use a Cap’n Crunch whistle to make free phone calls through pay phones by producing a 2600Hz tone.”
“In the past, programs were created by literally punching holes in cards. A pile of cards would define a program or collection of data. If somehow you lost the sequence of those cards, you would ruin a few days of coding.”
“One of the earliest forms of machine learning is the perceptron. It was implemented in custom-built hardware, and the ‘learning’ consisted of turning physical knobs!”
“The Morris Worm was released November 9, 1988 and was one of the first computer worms distributed via the Internet. The worm ended up causing more widespread destruction than intended. The source code is held on a floppy disk at The Computer History Museum in Mountain View, CA.”
“The computer onboard both the Apollo Command and Lunar modules was “programmed,” by hand weaving wire rope through small magnetic rings. A “1” bit was stored by weaving the wire through the ring, while a “0” bit was stored by bypassing the ring. The tedious process essentially required a “code freeze,” month before a launch. It was the responsibility of Margaret Hamilton to oversee the “rope weaving” process and ensure every bit was recorded correctly. She was a pioneer in modern computer science and coined the term “software engineer.””
“ There are more than 5000 new computer viruses released every month.”
“Theoretically, one could build a computer that knows only one instructions, and it still would be able to compute any thing that modern computers can compute!”
“Since 2019, we have visual evidence of a black hole. A team of international astronomers and computer scientists captured the first image of the supermassive black hole M87* which contains 6.5 billion solar masses. It’s larger than our Solar System! During the process, an array of telescopes collected more than a petabyte of data and was Katie Bouman who developed the algorithm that pieced all together.”
“Simple is Best! Albert Einstein said “If you can’t explain it simply, you don’t understand it well enough”. Early in my career, I learned that the simple solution is the right solution. Cyral, which comes from Saral (Hindi:सरल), means simple – simply the best solution for data security needs.”
“Erdos is known to have said that “A mathematician is a machine for turning coffee into theorems.””
“The canaries were one of the first countermeasures against stack-based buffer overflow attacks. The name is a reference to the canaries that were used in coal mines as a biological alarm system. In the mines, canaries would be affected by toxic gases earlier than the miners, whereas in a stack a canary would be overwritten earlier than the return address.”