Responsibilities:
Conduct in-depth security research to identify emerging cloud and AI-related threats and incorporate insights into our detection and prevention strategies.
Develop and maintain advanced security detections and best practices to identify and mitigate threats to customer data across diverse cloud platforms.
Collaborate closely with Product and R&D teams to translate security research findings into impactful product features and detection capabilities.
Design and prototype advanced detection techniques and automated workflows to continuously strengthen our ability to identify and safeguard sensitive data across complex, multi-cloud environments.
Continuously evaluate emerging cloud services, APIs, and data flows, integrating industry best practices and customer-driven insights to ensure our detection capabilities remain cutting-edge and adaptable.
Requirements:
3+ years of hands-on experience in a security-focused role with a strong emphasis on cloud environments.
Proficiency with at least one major cloud platform (AWS, Azure, or GCP) and practical experience securing various database technologies from a security perspective.
Strong hands-on skills with Linux, Python, Bash, SQL, or other query and policy languages (e.g., Rego).
Deep understanding of the cloud attack surface landscape, including emerging threats and modern attacker techniques.
Demonstrated ability to apply cybersecurity best practices to detect, analyze, and mitigate real-world threats in dynamic environments.
Proven experience analyzing large-scale cloud telemetry to produce actionable, data-driven security insights.
Self-motivated and capable of working independently as well as collaboratively within a multidisciplinary team.
Excellent communication skills, both written and verbal, with the ability to convey complex technical concepts clearly.
A passion for continuous learning and an innovative mindset, with a proven ability to think creatively and drive complex research projects from concept to impactful delivery.
Advantages:
Practical experience in incident response, threat hunting, or red teaming.
Hands-on expertise in building and operationalizing detection logic that enhances product security posture.