TL;DR
Senior Security Researcher (Cloud Threats): Designing and implementing detection strategies for cloud environments with an accent on cloud-native telemetry, adversary tradecraft, and detection-as-code principles. Focus on researching novel attack surfaces and developing production-grade detection logic to protect global organizations.
Location: Must be based in or able to work from the Tel Aviv office in Israel
Company
Tenable is the Exposure Management company, protecting 44,000 organizations and a significant portion of the Fortune 500 against cyber risks.
What you will do
- Own the research direction for Cloud Detection and Response (CDR) capabilities.
- Design detection strategies across agentless and agent-based telemetry sources.
- Conduct novel security research to uncover attacker tradecraft and behaviors in cloud environments.
- Develop and implement production-grade detections using detection-as-code principles.
- Translate threat intelligence into actionable detection logic and product features.
- Contribute to external thought leadership through technical writing and public speaking.
Requirements
- 5+ years of experience in threat research, cloud security, or detection engineering.
- Strong understanding of cloud platforms (AWS, Azure, GCP) and cloud-native telemetry.
- Solid expertise in attacker behavior, tradecraft, and threat intelligence.
- Experience designing security detections and working with detection-as-code principles.
- Ability to work independently in ambiguous problem spaces.
- Strong communication skills to articulate technical findings clearly.
Nice to have
- Experience with detection languages like YARA, Sigma, or Rego.
- Background in malware research, offensive security, or incident response.
- Proven track record of published research, conference talks, or technical blogging.
Culture & Benefits
- Work within a highly technical, elite cloud security research team.
- Focus on innovation and collaborative problem-solving.
- Environment centered on professional excellence and belonging.
- Access to resources needed to execute high-impact cybersecurity work.
