Open Positions | Lookout Webflow Homepage Platform Platform Phishing Protection Detects, blocks, and prevents phishing attacks that use fake emails, websites, or messages to trick users into revealing sensitive data. Smishing Protection Built to detect, block, and stop SMS-based phishing attacks that lure users into clicking malicious links, disclosing sensitive data, or installing malware through text messages Executive Impersonation Protection Detects and blocks attacks where cybercriminals pose as senior executives (e.g., CEO, CFO) to trick employees into sending money, sharing sensitive data, or performing other risky actions Mobile Endpoint Security Designed to prevent and detect mobile-specific threats by scanning apps, monitoring network activity, checking for jailbreaks or rooting, and enforcing security policies Mobile EDR Real-time monitoring, detection, investigation, and response for mobile devices, with forensic data collection for integration with broader EDR and SIEM systems Mobile App Reputation Service Evaluates apps to identify risks, analyzing code for malware, and monitoring behavior like data leaks or suspicious activity Mobile Vulnerability Management Scan devices for outdated OS versions and unpatched vulnerabilities, track CVEs, prioritizes fixes and enforce updates Mobile Intelligence APIs Provide actionable security insights about mobile devices, apps, and users, enabling integration of mobile risk data into your broader security ecosystem. Threat Intelligence Services Actionable data on attackers, tactics, vulnerabilities, and indicators of compromise, helping organizations anticipate and respond to cyber risks Secure DNS Block malicious domains and encrypt DNS queries to prevent phishing, spoofing, and unauthorized access, without needing a VPN Why Lookout Why Lookout Mobile: Distinctly Different Selecting the right tool for the job is essential for effective security—align your solution with the unique threats facing mobile devices, while safeguarding user privacy The AI First Advantage This isn't just AI-enhanced security. It’s security reimagined for the modern mobile threat landscape. Privacy Matters Privacy is central to mobile security as mobile devices blend personal and professional life The Clear Standout A side-by-side look at top mobile endpoint security solutions reveals how we stack up Threat Discovery Attackers Wielding DarkSword Threaten iOS Users Partners Partners Partner Programs As a channel-first company, we've built a large and strategic network of partners, fostering mutual growth Service Providers Gain cutting-edge protection solutions and complete peace of mind and significantly reduce your risk exposure MSSP Elevate and grow your endpoint security business by leveraging our cutting-edge technology Resellers and Distributors Unlock invaluable knowledge, extensive sales and technical resources, and incentives Strategic Technology Achieve complete visibility and robust control over all sensitive data assets, transforming how you protect critical information Latest Report Mobile Threat Landscape Report: Q3 2025 What security leaders need to know as mobile becomes the primary entry point for identity abuse and cloud compromise. Resources Resources Blogs Explore in-depth articles covering a wide range of cybersecurity topics. Webinars Gain valuable knowledge and practical tips on securing your systems and data. Podcasts Listen to insightful commentary and in-depth discussions on the latest cybersecurity trends and challenges. Videos Watch our latest video content, including tutorials, product demonstrations, and expert interviews. Virtual Demo Center Explore our extensive library of on-demand demos, allowing you to experience our solutions firsthand. Documents Dig into our comprehensive collection of white papers, technical guides, and solution briefs. Glossary Discover key security topics and understand the terminology used in the cybersecurity landscape. Threat Discovery Attackers Wielding DarkSword Threaten iOS Users Company Company
About Us Discover our mission protecting organizations against the modern mobile threat landscape Executive Leadership Learn about the vision and expertise guiding Lookout's innovative security solutions Board of Directors Meet the members serving on our Board of Directors Newsroom Stay informed with the latest news and company updates from Lookout Upcoming Events Join us at our next digital or in-person event to connect with experts and industry peers Careers Discover how you can contribute to shaping the future of mobile security Latest Report The Mobile Security Mirage: Unmasking Dangerous Misconceptions Learn what a recent global survey by Lookout of over 700 security leaders revealed Login Enterprise Partners Support Enterprise Support Login Enterprise Support Programs EN Deutsch Français Italiano Español Visit Threat Lab Contact Us Visit Threat Lab Open Positions Legal Privacy Policy Cookie Policy Transparency Report Do Not Sell or Share My Personal Information Compliance Information Sitemap © 2026 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design® and the Lookout multi-color/multi-shaded Wingspan Design® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, and the 4 Bar Shield Design. Why Lookout Mobile: Distinctly Different The AI First Advantage Privacy Matters The Clear Standout Partners Partner Programs Service Providers MSSP Resellers & Distributers Strategic Technology Company
About Us Executive Leadership Board of Directors Newsroom Upcoming Events Support Enterprise Support Login Enterprise Support Programs Contact Us How to Reach Us (844) 371-5665
Salary
$5,000 - $30,000
Location
Hyderabad, India
Experience
3+ years
Total raised
$432.2M
Last stage
Growth
Investors
Kevin Mahaffey
James Burgess
former COO and CIO
John Hering
Executive Chairman, former CEO
No applications, no recruiter spam. Just the intro.
A few questions to make sure this role is the right shape for you. Two minutes.
I write the intro, send it to the founder, and handle the back-and-forth.
If they’re a yes, I book the chat. You show up — that’s the whole job-hunt.