Why?
the industry's only complete solution for cloud threat detection, investigation, and response built by investigators, for investigators. supercharges todays SOC teams with the cloud capabilities that enterprises have been missing. delivers broad visibility across multi-cloud and SaaS environments with automation that speeds investigations, and rich context that informs cloud threat detection, hunting, and response. Together, capabilities minimize breach impact and enhance cyber resilience. As an Innovation Sandbox Finalist at RSA 2024 and a new SYN Ventures portfolio company (Series B, January 2025), is an innovator and pioneer in Cloud Security.
We're seeking a Research Developer (Python) who thrives in a security-focused research environment. As a member of our Research team, you'll collaborate closely with researchers and engineers to enhance our detection, investigation, and response capabilities, directly influencing our Cloud Detection and Response (CDR) platform.
What You'll Do
Develop Python-based tools, scripts, and frameworks supporting security research and investigations.
Collaborate with security researchers to translate research findings into practical detection and response mechanisms.
Contribute directly to the development and enhancement of our cloud forensic analysis capabilities.
Integrate innovative detection methods into our CDR platform, enabling advanced investigation workflows.
Optimize data querying and handling processes to support large-scale security research activities.
Experienced Python developer with at least 5 years of hands-on development experience.
Background in cybersecurity, cloud security, or a closely related field.
Familiar with at least one major cloud provider (AWS, Azure, or GCP).
Skilled in data manipulation, querying, and working with databases or data warehouses.
Strong analytical and problem-solving skills, particularly in security or incident investigation contexts.
It Would Be Nice If You Also Had
Experience with big data analysis tools like PySpark or Pandas.
Previous contributions to security research, technical blogs, or publications.
Exposure to cloud identity providers (e.g., Azure EntraID/AzureAD, Google Workspace).
Hands-on knowledge of cyberattack detection methods, forensic analysis, or incident response