Contributor Program

Calling all cybersecurity writers! Get paid to create original content for security and developer communities.

About the program

The Corellium Contributor Program invites AppSec and developer professionals with relevant knowledge and skills to create content to share with the community. Join us in our mission to create safer and more secure software for Arm-powered mobile and IoT devices.

We’re looking for experienced and proficient technical, cybersecurity writers eager to share their knowledge.

It’s a plus if you have experience authoring technical content and are familiar with the editorial process (i.e., you can handle feedback on your work and making revisions).

A cybersecurity writer sitting at a table with a cup of coffee and a pen and paper writing for Corellium’s contributor program.

What we’re looking for

Share your work! We’re looking for content focused on mobile and IoT security testing and software development that will help others in the community solve problems, troubleshoot issues, and create more secure software and hardware.

Topic examples

What you could write about.

icon_check_light-bg

Mobile vulnerability research

icon_check_light-bg

Mobile app pentesting

icon_check_light-bg

Mobile malware and threat research

icon_check_light-bg

IoT device R&D

icon_check_light-bg

Integrating Corellium with other tools

Content examples

How you could format it.

icon_check_light-bg

Blogs

icon_check_light-bg

Demo/How-To Videos

icon_check_light-bg

Tutorials

icon_check_light-bg

Webinar content

icon_check_light-bg

Courseware content

Content guidelines

Some rules around how we publish.

Referencing

Content should reference Corellium tools and other tools used as appropriate. If third-party tools are cited, please include links to their websites.

Branding

Content will be published by and branded with “Corellium”, using company-provided templates, and can be attributed to the contributor (if the contributor desires).

Exclusive content

Due to copyright restrictions, we can’t reuse content that’s been published elsewhere, so that includes AI-generated content.

Compensation

Corellium will compensate cybersecurity writers based on the framework listed below. This is only a guideline, and each engagement will be evaluated before work commences to agree upon appropriate payment that’s a win-win for everyone.

Written content 1,000-2000 words, video content 1-5 minutes, demonstrates a high level of subject matter expertise.

Article, Tutorial
$500 - $1500

Written content under 1,000 words, and video content under 1 minute, demonstrates subject matter expertise.

Blog
$250 - $500

Updates to content.

Docs, Videos
$50 - $150

How it works

The process is fairly straightforward, however we may change it from time to time. Even if you’ve published with us before, it’s a good idea to read through how our Contributor Program works before submitting ideas.

  1. Use the Form below to apply to the program. You’ll need basic contact information, plus details about your proposed topic, a brief outline, and if it’s your first submission with us, at least one writing sample that you feel represents your writing skills and technical knowledge.
    We publish original, first-run content under a Creative Commons license.
  2. Once approved, it’s time to create your content. When it’s ready, submit a draft for approval.
  3. Our editors will review your work for style, grammar, completeness, and technical accuracy, and provide feedback.
  4. Revise your work based on our notes. We want to ensure that everything checks out from a technical perspective, makes sense for the Corellium brand, and will help the community become more proficient.
  5. We’ll send payment and publish your article. It may be promoted across our social channels, web pages, and so on. Please feel free to share it on your own as well.
Three cybersecurity writers in a meting collaborating on blog ideas