Scale Expert Data Labeling Operations: Lead high-volume vulnerability labeling and validation work.
Drive Product Development Through Research Insights: Translate patterns and insights from your work into actionable product improvements.
Collaborate with Security Research Team: Maintain consistency in labeling standards and share research findings.
Deep Vulnerability Research: Conduct comprehensive research into cloud vulnerabilities affecting EC2 images, Docker containers, and cloud infrastructure.
Enhance AI Model Accuracy: Provide expert feedback through labeling tools that improves AI models' understanding of vulnerability context.
Technical Investigation and Analysis: Create detailed technical writeups about exploitation techniques, attack vectors, and remediation strategies.
Leverage External Security Intelligence: Integrate insights from CVE databases and threat intelligence sources to enrich findings.
Contribute to Thought Leadership: Support external presence through technical blog posts and conference presentations.
Requirements
Security Research Expertise: 5+ years of hands-on security experience with proven vulnerability research background.
Cloud Security Mastery: Deep knowledge of AWS security, cloud infrastructure vulnerabilities, container security, and cloud-native attack vectors.
Technical Investigation Skills: Strong coding and scripting abilities (Python, Go, or similar).
Analytical Excellence: Proven ability to analyze complex security data and communicate technical findings.
Product Mindset: Experience translating security insights into product requirements.
External Intelligence Integration: Experience working with vulnerability databases, security advisory feeds, and threat intelligence sources.
Collaborative Mindset: Strong communication skills and ability to work effectively with security research peers.
High-Volume Execution: Comfort with systematic labeling work while maintaining accuracy and attention to detail.
Nice to haves: Experience with AI/ML security or working with AI-generated security findings, Background at security tooling companies or building security products, Expertise in specific vulnerability research methodologies and frameworks, Open source contributions to security tools or research projects, Previous content creation experience in security (blogs, talks, research papers), Industry certifications (CISSP, OSCP, AWS Security, etc.)
Benefits
Ambitious Challenge: We're using generative AI (LLMs and agents) to solve some of the most pressing challenges in cloud security today.
Expert Team: We are a team of hands-on leaders with experience in Big Tech and Scale-ups.
Growing Security Research Function: Join a collaborative security research team where you'll work alongside other experts, share insights, and collectively shape how our AI platform understands security threats at scale.
Impactful Work: Your security research and labeling work will directly improve how thousands of organizations understand and respond to cloud security threats.
Product Influence: Your day-to-day research insights will directly influence product strategy and development, giving you a voice in building the next generation of AI-powered security tools.
Pioneer AI-Native Security: Help establish the gold standard for AI-assisted vulnerability research, defining how human security expertise enhances machine learning models in the cybersecurity domain.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
vulnerability researchcloud securityAWS securitycontainer securityPythonGotechnical investigationdata analysislabeling toolsAI model accuracy
Soft skills
collaborationcommunicationanalytical skillsproduct mindsetattention to detailthought leadershipsystematic executionresearch insightstechnical writingteamwork