Log InSign Up

Careers at Demyst

Demyst is a wonderful place to work, but being a coveted workplace means we are vulnerable to recruitment phishing scams. Most of these have individuals posing as representatives of prominent companies, including Demyst, with the aim of obtaining personal, sensitive, or financial information or extracting payment from would-be candidates. The scams prey upon an individual’s desire to obtain a job and can sometimes feel like a genuine recruitment process.

We urge all job seekers and candidates to be aware of such potential scams.

Should you encounter a recruitment process that claims to be for Demyst but is not consistent with the legitimate recruitment process, please do not provide any personal or financial information:

  • Most importantly, Demyst employees and recruiters working on our behalf will never solicit personal data (e.g., date of birth, social security numbers, or bank account information) from candidates during the application and interview phase. An out-of-the-blue request for such data is the biggest flag that the interaction is not legitimate.
  • Demyst may request some personal information to start the hiring process or draft a contract, but this will take place after a full recruitment process which includes multiple interviews by Demyst employees, including the hiring manager.
  • Demyst’s recruitment processes include communication with candidates through recognized professional networks, such as LinkedIn. However, further communication is always through an official Demyst email address (from the @demystdata.com domain), over the phone or through recruitment platforms such as Workable. While we sometimes work with external recruiters which may have non-Demyst email addresses, they will connect you Demyst employees with official Demyst email addresses for interviews.
  • Demyst’s interviews are conducted over the phone or via Zoom with video activated.

If you think that you have been a victim of fraud:

Job Openings

Don't settle for half the story

Demyst gives you access to all of the data you need. Evaluate thousands of data attributes from hundreds of possible data connectors all pulled into your own custom-built APIs for instant data deployment.