SafeHats | Managed Bug Bounty ProgramSafeHats | Managed Bug Bounty ProgramSafeHats | Managed Bug Bounty ProgramSafeHats | Managed Bug Bounty Program
  • Solutions
    • Enterprise Bug Bounty Program
    • The Real Hackathon
    • For Startups
  • Researchers
  • Blog
  • Resources
    • Resources
    • FAQ
    • SafeHats Guide
    • Customer Advisory Council
    • Hacker Advisory Council
    • How to sell SafeHats to your Boss?
  • Company
    • Team
    • Careers
    • Partners
    • Newsroom
  • Contact Us
  • LOGIN
  • SIGNUP
    • For Enterprises
    • For Researchers

Researchers

The SafeHats Tiger Team

Safehats Tiger

Our Elite Squad of Security Researchers

The SafeHats Tiger Team is a group of curated security researchers and hackers. They are selected based on their skills, previous work, accomplishments, and a variety of other factors. We are proud to partner with such talented individuals.

JOIN THE TIGER TEAM NOW

What's in it for me

Do you have what it takes to find a chink in this system? Become an Internet security hero. Use your skills, save the day, and get paid for it.

Leverage Your Unique Skill

Find a critical bug in enterprise-grade security systems and gain lucrative rewards

At the Forefront of Technology

Hands-on experience with the latest and greatest tech in the market

Bragging Rights

Gain swag within the community, and become a sought-after security researcher

Access to Private Programs

Get early access to some of the exclusive private programs

Access to Triaging Team

Opportunity to be part of the prestigious SafeHats Triaging team

SafeHats Tiger Badge

Get SafeHats exclusive merit badge on your profile picture

Safehats Hacker Etiquette

We are working together for a common goal: better information security and a safer Internet for us all. To that end, we have a list of guidelines for our partners. Safehats undertakes to protect the interests of all the security researchers and hackers in our community, so help us help you.

DO'S

Stick to the standard reporting structure. Once the bug is reported to us, we will confirm receipt in 72 hours. Thereafter, we need about 3 to 10 days for verification and validation.

Adhere to the scope of the program.

Use only test accounts to discover vulnerabilities, and not live accounts, as this may disrupt service.

DON'TS

Don’t publicise the bug before it has been resolved. We assure you that your bragging rights remain intact.

Do not disrupt or change live user data or account information during a discovered breach.

No automated scanners please! We want your unique expertise only.

Are you a TIGER?

At SafeHats it is our top priority to ensure that we bring fourth the best and trusted minds in the world, so that the collective brain power can be leveraged to find the most critical and high impact vulnerabilities. Our Tiger Team applicants are screened through behavioral and professional interviews and skill tests.

Shortlisting Process

Past Experience

Skill-sets and Certifications

Previous Work Samples

Questionnaire Test

Online Interview

Identification Document Check

0
Cyber Attacks Per Year
0
% Cyber Attacks Target Small Businesses
0
New Malware Samples Detected Everyday
0
Million Dollar Worth Ransomware Attack Losses Since 2015

Watch the video

SafeHats Managed Program

Our acclaimed 'Managed Program' has been carefully calibrated to provide the best value for large enterprises. We become an extension of your security setup, by not only creating, deploying, and tracking bugs raised by researchers, but by using in-house expertise to adjust programs as required.

Enterprises Get Started
Researchers Enroll Now

SafeHats is an advanced managed bug bounty platform which connects you to a crowd of highly skilled, trusted and curated security researchers to identify vulnerabilities in your digital assets

Quick Links

  • Home
  • Researchers
  • Blog
  • Contact Us
  • Sitemap

Company

  • Careers
  • Newsroom
  • Partner Program
  • Resources Featured Doc
  • Customer Advisory Council

Important Links

  • Login
  • Signup for Enterprises
  • Signup for Researchers
Copyright © 2020 InstaSafe. All Rights Reserved.
  • Solutions
    • Enterprise Bug Bounty Program
    • The Real Hackathon
    • For Startups
  • Researchers
  • Blog
  • Resources
    • Resources
    • FAQ
    • SafeHats Guide
    • Customer Advisory Council
    • Hacker Advisory Council
    • How to sell SafeHats to your Boss?
  • Company
    • Team
    • Careers
    • Partners
    • Newsroom
  • Contact Us
  • LOGIN
  • SIGNUP
    • For Enterprises
    • For Researchers
SafeHats | Managed Bug Bounty Program