Get 24/7 incident response assistance from our global team
- APAC: +65 3159 4398
- EU & NA: +31 20 890 55 59
- MEA: +971 4 540 6400
- LATAM: +56 2 275 473 79
Get 24/7 incident response assistance from our global team
Please review the following rules before submitting your application:
1. Our main objective is to foster a community of like-minded individuals dedicated to combatting cybercrime and who have never engaged in Blackhat activities.
2. All applications must include research or a research draft. You can find content criteria in the blog. Please provide a link to your research or research draft using the form below.

Understand the role and value of threat hunting by identifying relevant logging sources and enriching data to support structured, repeatable analysis.

Apply the scientific method to hypothesis-driven discovery by interpreting open-source threat data and extracting actionable intelligence for deeper investigations.

Recognize attacker behavior in complex, multi-host environments and create, test, and refine hunting hypotheses based on real-life data while contributing to hunting methodology and capacity development.






