Required Senior Security Researcher – Cloud – Security Automation (Cortex)
Your Career:
Are you passionate about taking automation to the next level? Do you live and breathe the cyber security world? Do you want to take part in an innovative and disruptive team that will have an impact on the lives of many customers?
As a Cloud Cybersecurity Researcher, you will design and implement remediation strategies for cloud runtime and posture issues, ensuring responses are as autonomous, effective, and safe as possible. You will collaborate with leading security experts, leverage cutting-edge technologies, and contribute to the vision of an Autonomous SOC.
Your Impact:
Develop robust, testable, and safe remediation plans for cloud runtime and posture issues (CSPM, DSPM, CIEM, CNAPP, IAM, etc.)
Conduct in-depth research to identify attacker TTPs and cloud misconfiguration risks, and translate findings into automated response playbooks
Apply data analysis, programming, and modeling techniques to evaluate and optimize remediation approaches
Collaborate within a diverse research group to continuously improve automation processes and methodologies
Stay ahead of evolving threats, including cloud-native attack vectors and advanced adversary tradecraft.
Your Career:
Are you passionate about taking automation to the next level? Do you live and breathe the cyber security world? Do you want to take part in an innovative and disruptive team that will have an impact on the lives of many customers?
As a Cloud Cybersecurity Researcher, you will design and implement remediation strategies for cloud runtime and posture issues, ensuring responses are as autonomous, effective, and safe as possible. You will collaborate with leading security experts, leverage cutting-edge technologies, and contribute to the vision of an Autonomous SOC.
Your Impact:
Develop robust, testable, and safe remediation plans for cloud runtime and posture issues (CSPM, DSPM, CIEM, CNAPP, IAM, etc.)
Conduct in-depth research to identify attacker TTPs and cloud misconfiguration risks, and translate findings into automated response playbooks
Apply data analysis, programming, and modeling techniques to evaluate and optimize remediation approaches
Collaborate within a diverse research group to continuously improve automation processes and methodologies
Stay ahead of evolving threats, including cloud-native attack vectors and advanced adversary tradecraft.
Requirements:
Strong background in cloud security operations and incident resolution
Deep expertise in at least one of the following: incident response, red teaming, or advanced threat hunting/detection research
Hands-on experience with cloud platforms (AWS, GCP, or Azure) and associated security services
Proficiency in Python and practical experience building automation or playbooks
Experience working with SQL or similar query languages for large-scale data analysis
Strong analytical skills, independent thinking, and ability to collaborate in a team environment
Advantages:
Experience with big data platforms (e.g., GCP BigQuery, AWS Athena)
Familiarity with security tools such as XDR, EDR, CSPM, DSPM, CNAPP, CIEM, and SOAR
Deep knowledge of attacker techniques, cloud-native threats, and mitigation strategies
Experience with machine learning or data-driven security analysis.
Strong background in cloud security operations and incident resolution
Deep expertise in at least one of the following: incident response, red teaming, or advanced threat hunting/detection research
Hands-on experience with cloud platforms (AWS, GCP, or Azure) and associated security services
Proficiency in Python and practical experience building automation or playbooks
Experience working with SQL or similar query languages for large-scale data analysis
Strong analytical skills, independent thinking, and ability to collaborate in a team environment
Advantages:
Experience with big data platforms (e.g., GCP BigQuery, AWS Athena)
Familiarity with security tools such as XDR, EDR, CSPM, DSPM, CNAPP, CIEM, and SOAR
Deep knowledge of attacker techniques, cloud-native threats, and mitigation strategies
Experience with machine learning or data-driven security analysis.
This position is open to all candidates.