No. You decide how much time you spend, and get paid for what you accomplish. For most, hacking as an SRT member is something they do for a few hours each week.
For the best SRT, a significant income can be earned, equivalent or higher than the average annual wages of most countries.
SRT members are independent contractors of Synack. This will result in income reported via a 1099 form with the IRS for US SRT members and a W8BEN for non-US SRT members.
Finding vulnerabilities pays the most. But you have to find them first. There is one exception: During an hours-long Initial Launch Period, we award to the best reporter for each vulnerability.
Missions are offered and snapped up quickly by SRT. Once you have one, you will earn the money guaranteed if you complete the Mission in time, and according to the rules.
A regular Mission such as “Check for default passwords” will earn $25-50, while an ad-hoc Mission can easily exceed $100+. Vulnerabilities vary based on their severity and novelty – typical $500 to several thousand dollars.
Our average vulnerability payment was in the $600-$900 range in 2020, with very wide variation on individual rewards.
To remain active on the SRT, researchers must meet the minimum annual requirements set forth in the annual productivity assessment.
Once on the SRT, you have access to Synack’s portal. It is an ethical hacking platform that seeks to make your hacking time efficient and lucrative.
Among other features, it alerts you to new targets, helps you with recon, keeps track of your reports, tells you what has been found already, and more.
Synack publishes a list of minimums and high payments for vulnerabilities by category, which is available to valid SRT members.
Vuln Ops, a part of Synack. No customer sets or awards payments, so the treatment of the SRT is professional and consistent.
Typically no, but you can make a request via [email protected] Publishing is only allowed with customer approval.
Synack customers are often large global and government institutions. However, we have a diverse set of customers including small companies and start-ups.
Synack provides security work for security researchers around the world. The majority is bug bounty-style hunting, where researchers compete on skill, speed and report quality to get their work accepted and ultimately paid. We also have Missions—which are payments for simpler work. Mission types included confirming or denying suspected vulnerabilities we find, or checking for specific weaknesses in a checklist form.
Synack also pays for patch verification, so get paid more to confirm a vuln you found has been closed.
From time to time, we offer special Missions that reflect work that needs to be done by our customers.
Regional HackerHangout events, Envoy, and Annual HackerHangout competitions in unique locations: Mexico, Bali, Costa Rica, Goa.
Customers may from time to time use Synack’s messaging system to communicate with SRT members through the Synack Platform. These communications are typically regarding questions the customer has about work submitted by the SRT member.
Furthermore, Synack will not share the identity of its SRT members without the SRT member’s consent, unless required by law or in connection with an investigation of potential rules violations.
As a researcher on the Synack Red Team, you will be expected to uphold the highest levels of trust for both Synack and our customers. While working on the platform, SRT will be responsible for any and all traffic sent to customer targets and adhering to rules of engagement on every program. Researchers may work individually, or team up with others in the community to provide their best security work possible. Together, the researchers in the Synack Red Team bring dynamic world-class perspectives, experiences and skills to bear on some of the worlds most secure technologies.
To protect SRT members against certain third-party claims, Synack has agreed to indemnify SRT members against claims resulting from a customer mistake in providing an incorrect scope of work to Synack. The availability of the indemnity is subject to certain terms set forth in the Researcher TOU.
Missions are work that is claimed or assigned to individual SRT members. Each has a discreet payment, for a specific amount of work that must be accomplished in a timely manner.
Missions do not always require finding new vulnerabilities.
Synack ensures that there is a fair opportunity to find vulnerabilities by rotating access to targets across the SRT. This reduces the number of duplicate/wasted effort and helps manage researcher load on customer assets. The more researchers engage and participate, the more targets and opportunities they receive!
Such opportunities include (for example) periodic requests Synack for small set of researchers with specific skills and experience to look at specific targets in special circumstances.
Synack operates responsibledisclosure.com, which has several public, unpaid programs on behalf of our customers. These are open to the public, including SRT.
Synack does not operate public, bounty-paying programs to avoid creating incentives that may encourage, or cover for, less than ethical hacking.