This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
Are you passionate about dissecting the intersection of Identity, SAAS, and Cloud infrastructure? We are looking for a visionary Security Researcher to join our team and redefine how organizations understand and mitigate risks across their SaaS and Cloud ecosystems. In this role, you will be investigating the fundamental ways services are utilized and how their configurations can be exploited by modern adversaries. You will bridge the gap between abstract SaaS & cloud architecture and real-world attack execution, transforming complex research into actionable guidance. If you thrive on deconstructing TTPs and building the blueprints for resilient service usage, this is your opportunity to lead the charge in a world-leading cybersecurity company.
Job Responsibility:
Lead ongoing investigations into the risks associated with SaaS, Identity and Cloud platforms, focusing on how these services are integrated within broader environments
Analyze the functional 'how-to' of cloud services to identify inherent risks and develop robust strategies for secure implementation and usage
Stay ahead of the curve by researching real-world attacker methodologies and translating these behaviors into practical mitigation strategies
Design and execute high-fidelity attack simulations in lab settings to observe adversarial behavior firsthand, specifically focusing on identity-based and SaaS
Create comprehensive research outcomes that guide customers on how to use services securely from the ground up
Foster a culture of excellence within a diverse team of experts, sharing insights that influence the next generation of cloud and identity security products
Requirements:
Bachelor's degree in Computer Science, Cybersecurity, or a related field, or equivalent practical experience
Strong understanding of modern adversary TTPs and attack methodologies
Experience with designing and executing simulated attack scenarios in lab environments
Nice to have:
Proven experience in security research, specifically focusing on SaaS, Identity Providers (IdP), or Cloud platforms
History of public-facing research, such as conference presentations or blog posts
Experience with reverse engineering and vulnerability analysis
Proficiency in one or more programming languages like Python or Go