Sysdig aims to help organizations secure innovation in the cloud by providing real-time clarity and threat detection, and this role will contribute to researching and developing solutions for cloud and container security.
Requirements
- 5 years of cybersecurity experience with knowledge of any of the following: Threat Intelligence, Threat Hunting, Penetration Testing, Malware Analysis, or Incident Response, Software Engineer
- Hands-on experience using security analysis tools like OSINT tools, IDA Pro, strace, Metasploit, and Falco
- You've deployed and worked with container-based cloud infrastructure, including Docker and/or Kubernetes
- Leveraged any of the major cloud providers – AWS, GCP or Azure as part of your active security research
- Experience with scripting for the purposes of data analysis or automation
Responsibilities
- Research novel cloud-based cyber attacks and malicious actor TTPs, reporting to the Sr. Director, Threat Research.
- Author content on all aspects of cloud and container security and publish your findings
- Develop applicable threat intelligence based on malware analysis to help secure our customers' environments
- Partner with our application and product teams to architect security solutions for containers, Kubernetes, and cloud
- Develop security rules and algorithms based on security research and best-practices
Other
- Proven ability to autonomously develop novel research topics based on new threat trends, attacker behaviors, and gaps in current security detection.
- Naturally inquisitive, motivated to dig deep, and always looking to learn.
- Ability to independently develop new research topics and take ownership of security projects
- Able to interpret complex data
- Sysdig values a diverse workplace and encourages women, people of color, LGBTQIA+ individuals, people with disabilities, members of ethnic minorities, foreign-born residents, and veterans to apply.