wagey.ggwagey.ggv1.0-e93b95d-4-May
Browse Tech JobsCompaniesFeaturesPricingFAQs
Log InGet Started Free
Jobs/Security Analyst Role/wiz.io - Threat Detection Researcher (Windows/Linux)
wiz.io

wiz.io - Threat Detection Researcher (Windows/Linux)

Unknown1w ago
In OfficeSeniorWWCloud ComputingSecurity AnalystKubernetesAWSGCPAzureLinux

Upload My Resume

Drop here or click to browse · Tap to choose · PDF, DOCX, DOC, RTF, TXT

Apply in One Click
Apply in One Click

Requirements

• 6+ years of experience in security or threat research in which you conducted deep research with actionable conclusions and impacts • Intimate knowledge of OS internals (Windows/Linux) and networking • Familiarity with cloud services, Kubernetes, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure) • Experience delivering security detections in customer-facing product(s) • The ability to learn independently, to be self-driven and goal-oriented • Excellent communication and teamwork skills • ADVANTAGE • Hands-on experience with malware analysis/reverse engineering/vulnerability research • Familiarity with notable threat actors and threat intelligence analysis • IR/red-team/threat-hunting experience • By submitting your application, you acknowledge that Wiz will process your personal data in accordance with Wiz's Privacy Policy and that you consent to the retention of your application for consideration for future opportunities at Wiz. • and that you consent to the retention of your application for consideration for future opportunities at Wiz • Applicants must have the legal right to work in the country where the position is based, without the need for visa sponsorship. This role does not offer visa sponsorship.

Responsibilities

• Develop detections and tools to protect customers from cloud threats • Investigate attacks on cloud environments and malware targeting cloud workloads • Hunt and analyze real-world attacks and emerging cloud threats • Collaborate closely with the R&D team to transform research insights into product features • Work with customers in response to requests related to suspicious activity or potential incidents • Create best practices and security policies based on research findings • Deliver external-facing content (blog posts and talks at security conferences) based on security insights and novel research

Get Started Free

No credit card. Takes 10 seconds.

Privacy·Terms··Contact·FAQ·Wagey on X