CrawlJobs Logo

Threat Detection Researcher

wiz.io Logo

Wiz

Location Icon

Location:
Israel, Tel Aviv

Category Icon
Category:
IT - Software Development

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

Come join the company that is reinventing cloud security and empowering businesses to thrive in the cloud. As the fastest-growing startup ever, Wiz is on a mission to help organizations secure cloud environments that will accelerate their businesses. Trusted by security teams all over the world, we have a proven track record of success and a culture that values world-class talent. Our Wizards from over 20 countries work together to protect the infrastructure of our hundreds of customers, including over 45% of the Fortune 100, who trust us to scan and secure over 230 billion files daily. We’re the leading player in a massive and growing market, but it’s still early enough for you to make a significant impact. At Wiz, you’ll have the freedom to think creatively, dream big, and use your full range of skills to contribute to our record growth. Come join our team and help us create secure cloud environments that allow the best companies to move faster.

Job Responsibility:

  • Develop detections and tools to protect customers from cloud threats
  • Investigate attacks on cloud environments and malware targeting cloud workloads
  • Hunt and analyze real-world attacks and emerging cloud threats
  • Collaborate closely with the R&D team to transform research insights into product features
  • Work with customers in response to requests related to suspicious activity or potential incidents
  • Create best practices and security policies based on research findings
  • Deliver external-facing content (blog posts and talks at security conferences) based on security insights and novel research

Requirements:

  • 6+ years of experience in security or threat research in which you conducted deep research with actionable conclusions and impacts
  • Intimate knowledge of OS internals (Windows/Linux) and networking
  • Familiarity with cloud services, Kubernetes, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure)
  • Experience delivering security detections in customer-facing product(s)
  • The ability to learn independently, to be self-driven and goal-oriented
  • Excellent communication and teamwork skills

Nice to have:

  • Hands-on experience with malware analysis/reverse engineering/vulnerability research
  • Familiarity with notable threat actors and threat intelligence analysis
  • IR/red-team/threat-hunting experience

Additional Information:

Job Posted:
December 13, 2025

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Threat Detection Researcher

Senior Product Manager – Threat Detection

As a Product Manager – Threat Detection, you will be responsible for driving the...
Location
Location
United States
Salary
Salary:
182000.00 - 219000.00 USD / Year
https://corelight.com/ Logo
Corelight
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years in a technical support, engineering, or security research role
  • 3+ years in networking in a product or practitioner role
  • 5+ years overall experience in cybersecurity, with a focus on network security and threat detection
  • Strong understanding of network protocols, network security principles, and intrusion detection methodologies
  • Experience with Zeek (Bro) and its applications within NDR and security operations
  • Experience with network forensics, packet analysis, and network-based anomaly detection
  • Strong analytical skills, with the ability to interpret and apply threat intelligence and attack frameworks (e.g., MITRE ATT&CK)
  • Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity, or equivalent experience
Job Responsibility
Job Responsibility
  • Develop and maintain a cutting edge detection engineering program via collaboration with Corelight Labs Research
  • Execute the product strategy for Corelight’s threat detection capabilities
  • Research adversary tactics, emerging network threats, and novel detection methodologies to improve the effectiveness of Corelight’s NDR solutions
  • Work closely with threat researchers, SOC analysts, and detection engineers to develop high-fidelity detection logic and optimize network threat intelligence
  • Analyze network protocols and traffic patterns to identify new ways to extract valuable security-relevant insights
  • Collaborate with engineering, UX, and security research teams to develop new features and improve the usability of Corelight’s threat detection tools
  • Contribute to open-source security initiatives, representing Corelight in the broader security community and helping drive innovation
  • Act as a technical liaison between customers, security teams, and internal stakeholders to ensure Corelight remains the gold standard for network evidence collection
  • Define, prioritize, and refine product requirements for threat detection capabilities, integrations, and intelligence applications
  • Develop detection content, documentation, and best practices for leveraging Corelight’s platform in threat hunting and incident response workflows
What we offer
What we offer
  • Equity
  • Additional benefits
  • Collaborative, inclusive, and growth-oriented culture
  • AI-assisted workflows
  • Machine learning models
  • Cloud security and SaaS-based solutions
  • Geographically distributed yet connected employee base
  • Fulltime
Read More
Arrow Right

Research Manager

We are building a world class and uniquely targeted team to drive research throu...
Location
Location
United States
Salary
Salary:
193000.00 - 248000.00 USD / Year
https://corelight.com/ Logo
Corelight
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • BS in Computer Science or Engineering, or equivalent experience
  • 2+ years of experience managing technical teams performing duties in the areas of security research, incident response, and/or DevOps concepts (e.g. sprint planning, delivery tracking)
  • 5+ years of hands-on experience in at least one technical field of information security
  • security research, and detection engineering are preferred
  • Working knowledge of detection engineering, incident response, and threat hunting
  • experience with Zeek, Suricata, YARA, one or more SIEMs are strongly preferred
  • Working knowledge of software engineering practices
  • experience with Jira, git, and GitLab CICD are strongly preferred
  • Working knowledge of networking concepts and network protocols such as TCP/IP, HTTP, TLS, DNS, Kerberos, SMB
  • Working knowledge of programming in at least two languages
Job Responsibility
Job Responsibility
  • Manage a team of security researchers and detection engineers responsible for investigating, creating, and maintaining detection capabilities, and developing associated software engineering tools
  • Collaborate closely with the rest of the Corelight Labs leadership team to devise, pursue & meet project goals and deadlines
  • Collaborate closely with the Corelight Products and Engineering teams to coordinate cross-team projects
  • Fulltime
Read More
Arrow Right
New

Network Threat Support Specialist

The Network Threat Support Specialist will be actively integrated into a compute...
Location
Location
United States , Fort Meade or Columbia
Salary
Salary:
Not provided
gsconsultingllc.com Logo
GS Consulting
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Must be a United States citizen
  • Position requires candidates to have the ability to obtain and maintain a background investigation
  • Bachelor's degree or equivalent military training
  • Experience discovering threats and/or anomalies in network data
  • Experience discovering and responding to network intrusions
  • Experience adjusting security controls to prevent malware and/or intrusion activity
  • Ability to produce formal documentation on analysis and assessments
  • Experience conducting analysis with DNI/DNR
  • Self motivated and willing to work with a team
  • The ability to appropriately manage individual schedule
Job Responsibility
Job Responsibility
  • Identify adversarial threats and activities against DoD and US government network
  • Analyze and discover threat and intrusion events
  • Leverage technical analysis capabilities to analyze malware and develop methods to defend against malicious activity
  • Respond to and analyze network intrusion and attack events
  • Characterize the capabilities of malware, document how to detect malware, and assess it’s impact
  • Analyze systems and networks of interest, identify network vulnerabilities, and create techniques to exploit networks
  • Write reports for customers based on research and analysis of cyber threat activities and techniques
Read More
Arrow Right

Threat Intelligence Analyst

As a Threat Analyst at UpGuard, you will be an integral member of our Threat Sca...
Location
Location
United States , Chicago
Salary
Salary:
120000.00 USD / Year
https://www.upguard.com Logo
UpGuard
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Expertise in Open Source Intelligence: Strong understanding of OSINT methodologies with a focus on the open, deep, and dark web
  • Understanding of Software Development: Solid grasp of software development processes to deconstruct and interpret vulnerability disclosures effectively
  • Cross-Team Collaboration: Excellent communication skills to work with the Customer Success & Support teams, explaining capabilities and resolving customer issues
  • Independence and Initiative: A self-starter attitude with the ability to take ownership of tasks and drive them to completion independently or collaboratively
  • Technical Skills in Scripting: Proficiency in scripting languages such as Python, with the ability to learn and adapt to new programming languages as needed
Job Responsibility
Job Responsibility
  • Analyze Data Leaks: Process and assess incoming data feeds to identify whether customers have been impacted by data leaks
  • Contribute to Threat Intelligence Feeds: Enhance UpGuard’s proprietary threat intelligence feeds by researching and integrating new findings
  • Develop Vulnerability Detections: Build new product and vulnerability detections by reverse-engineering applications, analyzing vulnerability disclosures, and creating robust detection methodologies
  • Conduct Open Source Intelligence (OSINT) and Security Research: Focus heavily on identifying, analyzing, and interpreting open-source intelligence across the open, deep, and dark web to identify risks and vulnerabilities
What we offer
What we offer
  • Monthly Lifestyle subsidy: use this for financial, physical, and mental wellbeing
  • WFH set-up allowance: to ensure you have the right environment to work in, we will help you get set up within your first 3 months at UpGuard
  • $1,500 USD annual Learning & Development allowance: to support your career development all team members will be able to expense development opportunities against this allowance
  • Generous Annual Leave/PTO allowances: time to recharge your batteries
  • 18 weeks paid Parental Leave: irrespective of parenting role
  • Personal Leave allowance: this includes sick & carer’s leave
  • Fully remote working environment: while we have physical offices in Sydney & Hobart, we do not mandate compulsory attendance
  • Top-spec hardware: all team members will be provided with top-spec laptops for their roles
  • Personal device security & online privacy protection subsidy: UpGuard provides team members with a paid subscription to personal device security & online privacy protection platform
  • Generative AI subsidy: UpGuard provides paid subscriptions for all team members to access generative AI tools to support their work
  • Fulltime
Read More
Arrow Right

Senior Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
256000.00 - 342000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • Experience with AWS, GCP, or similar cloud platforms
  • Experience in building and delivering projects from start to finish
  • Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Contributions to the security community or open source projects
  • Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution. Participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • health and wellbeing resources
  • paid volunteer days
  • Fulltime
Read More
Arrow Right

Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
184500.00 - 246000.00 PLN / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience: 3+ years in security domains like Operations, Incident Response, Detection Engineering, Threat Research, or Engineering, with relevant incident response and investigation experience
  • Technical Skills: Proficiency in modern programming languages (Python, Ruby, Java, Go) or scripting for security tasks
  • experience with AWS, GCP, or similar cloud platforms
  • Project Management: Experience in building and delivering projects from start to finish
  • Specialization: Expertise in areas such as malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Community Engagement: Contributions to the security community or open source projects
  • Communication: Capable of explaining technical issues to non-technical stakeholders
Job Responsibility
Job Responsibility
  • Security Incident Management: Act as an escalation point, collaborate with partners, communicate updates, and work towards resolution
  • participate in on-call roster and conduct post-incident reviews to analyze causes and recommend improvements
  • Investigation and Analysis: Investigate log data from multiple sources for signs of compromise, conduct threat hunts, research threat actor tools and tactics, and lead evidence collection and forensic analysis
  • Technical Solutions and Automation: Provide technical solutions to reduce incidents, build and maintain tools for automation, and develop security incident response guides and procedures
  • Advocacy and Training: Advocate for security best practices and secure coding standards, and conduct tabletop exercises and simulations to test and improve incident response readiness
What we offer
What we offer
  • Health and wellbeing resources
  • paid volunteer days
  • equity
  • bonuses
  • commissions
  • Fulltime
Read More
Arrow Right
New

Chief Cybersecurity Solutions Officer

Loginsoft is a renowned provider of cybersecurity engineering services, speciali...
Location
Location
United States , Washington, DC
Salary
Salary:
Not provided
loginsoft.com Logo
Loginsoft
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10-15 years in technology solutions and engineering services, with 7-10 years in delivering effective cybersecurity solutions
  • Strong background in solution development, user research, and agile environments
  • Deep industry knowledge essential for strategic vision and planning
  • Proficient in impactful presentations, deal negotiation, and building client relationships
  • Effective representation of customer and end-user voices
  • Strong in developing simplified marketing content
  • Demonstrate leadership to effectively lead cross-functional teams, drive collaboration, and foster cross-functional teamwork, communication, and effective leadership
  • Demonstrate deal-closing expertise and stakeholder collaboration
  • Showcase familiarity with emerging cybersecurity tech for a visionary roadmap
  • Possess strategic thinking, entrepreneurial spirit, and strong understanding of the cybersecurity marketplace, including buyer and end-user priorities, with research, feedback, and effective communication skills
Job Responsibility
Job Responsibility
  • Cybersecurity Leadership and Roadmap Development: Lead and leverage expertise in threat intelligence, vulnerability management, cloud security, threat hunting, and threat detection. Address client pain points, stay informed on research, emerging technologies, and industry trends. Shape the cybersecurity solutions roadmap, evaluating emerging technology applications and their impact on partnerships, pricing, and planning. Foster a shared vision and advocate for the customer perspective throughout development, delivery, and deployment
  • Cybersecurity Engineering Services Growth and Adoption: Drive the growth and adoption of cybersecurity engineering services by driving penetration of existing solutions in the existing markets / cybersecurity product companies, and extending solutions to enterprise companies, delivering talented engineering resources and customized offerings. Collaborate with the CRO and CTO to align revenue generation efforts and customer satisfaction goals. Ensure the viability, feasibility, and desirability of security services by leveraging cybersecurity experience and industry knowledge. Gain comprehensive insights into the cybersecurity industry, including offerings, tools, major players, and trends. Work closely with stakeholders to fuel revenue growth and champion the customer's voice
  • Client Engagement and Relationship Management: Serve as a key point of contact for new clients / customers, collaborating with the CRO and CTO to deliver compelling presentations, lead negotiations, and align revenue goals with client expectations. Build and nurture lasting client relationships through effective communication, understanding their needs, and ensuring customer satisfaction. Represent the voice of the customer, working closely with stakeholders, including the CRO and CTO, to drive revenue growth and maintain strong partnerships
  • Strategic Partnerships and Collaborations: Forge strategic partnerships and collaborations by establishing strong relationships with industry stakeholders, fostering collaboration, and creating opportunities for joint initiatives and market expansion. Collaborate with marketing and communications teams to develop impactful content and messaging that effectively communicates the value and benefits of cybersecurity engineering services
  • Thought Leadership and Innovation: Provide thought leadership and innovation in the cybersecurity industry by staying informed about research advancements, emerging technologies, and industry trends. Identify opportunities to leverage existing innovations and invest in new ideas to deliver valuable cybersecurity solutions. Utilize deep knowledge of the industry, customers, and end-users to predict the future, define roadmaps, and position the cybersecurity solutions and the company as a leader in the market. Actively engage on LinkedIn and other social media platforms to promote our services and participate in industry forums as a speaker to drive industry recognition and engagement
  • Deal Closing and Strategic Collaboration: Collaborate with stakeholders, including the CTO, CRO, partners, and clients, to align strategies with market trends and customer needs. Drive the efforts to close deals by capitalizing on the abundant leads and opportunities we receive. Conduct research and gather feedback to define the vision, goals, and roadmap for cybersecurity solutions. Provide strategic guidance for business development, leveraging your expertise in successful deal closures. Foster cross-functional collaboration to bring industry-leading cybersecurity solutions to market, driving adoption, and ensuring successful outcomes
  • Fulltime
Read More
Arrow Right

Security Incident Response Analyst

We are looking for an Incident Responder with robust technical skills, expertise...
Location
Location
Poland , Gdańsk
Salary
Salary:
Not provided
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of experience in any security domain: Operations, Incident Response, Detection Engineering, Threat Research, or Engineering
  • Relevant work experience for responding to incidents and conducting investigations
  • Fluency in any modern programming languages (preferably Python, Ruby, Java or Go) or experience scripting to complete security tasks
  • Experience with AWS, GCP, or a similar cloud service platform
  • Self-motivated and results-oriented
  • Experience building and delivering projects from start to finish
  • Passion for collaboration and strong interpersonal skills
  • Specialization in one or more areas: malware analysis, forensics, threat hunting, network analysis, or cloud endpoint analysis
  • Contributions to the security community or open source projects
  • Excellent written and verbal communication skills, including the ability to explain technical issues to non-technical stakeholders.
Job Responsibility
Job Responsibility
  • Act as an escalation point for security incidents, collaborating with stakeholders and communicating updates while actively working towards the resolution of incidents
  • Investigate and analyze log data stemming from security events across multiple sources to determine signs of compromise
  • Conduct post-incident reviews to analyze the root cause, assess the response, and recommend improvements
  • Participate in the on-call roster for security incident response
  • Deliver technical solutions to mitigate security incidents and enhance incident response capabilities
  • Advocate for security best practices and secure coding standards across the organization
  • Conduct threat hunts to identify new attack vectors and develop strategies to counteract them
  • Research tools and tactics employed by threat actors
  • Build and maintain tools and systems to automate response processes and improve efficiency
  • Develop and maintain security incident response playbooks and standard operating procedures
What we offer
What we offer
  • Health and wellbeing resources
  • Paid volunteer days
  • Support for accommodations or adjustments during recruitment process
  • Fulltime
Read More
Arrow Right
Welcome to CrawlJobs.com
Your Global Job Discovery Platform
At CrawlJobs.com, we simplify finding your next career opportunity by bringing job listings directly to you from all corners of the web. Using cutting-edge AI and web-crawling technologies, we gather and curate job offers from various sources across the globe, ensuring you have access to the most up-to-date job listings in one place.