Highlights: - High growth: In just six years, we’ve reached milestones that take other companies a decade or more. We’ve doubled our employee count, tripled our customer count, and rapidly expanded our product capabilities.
- Disruptive innovation: Our founders saw that traditional security didn’t work for the cloud so they set out to carve a new path. We’re relentless pioneers who invented agentless technology and continue to be the most comprehensive and innovative cloud security company.
- Well-capitalized: With a valuation of $1.8 billion, Orca is a cybersecurity unicorn dominating the cloud security space. We’re backed by an impressive team of investors such as Capital G, ICONIQ, GGV, and SVCI, a syndicate of CISOs who invest their own money after conducting their due diligence.
- Respectful and transparent culture: Our executives pride themselves on being accessible to everyone and believe in sharing knowledge with the employees. Each employee has a place in shaping the future of our industry.
About the role:
Our sensor delivers deep runtime visibility across cloud environments, spanning processes, syscalls, network activity, operating systems, and containerized workloads. As a Detection Analyst, you will examine this data at scale, refine detections, surface suspicious behaviors, and collaborate with the research team to continuously improve our security outcomes.
On a typical day you’ll: - Examine runtime events and security findings collected by the Orca Sensor to identify patterns, anomalies, and potential threats.
- Tune detection logic to reduce false positives and improve accuracy.
- Investigate alerts from real customer environments and propose improvements.
- Work closely with the research team to refine existing detections and provide insight for new ones.
- Partner closely with field teams and product managers – managing requests, sharing findings, and keeping everyone aligned.
- Produce short internal or external updates on relevant security trends or incidents.
- Use Elasticsearch to explore detection data and visualize trends.
- Contribute to detection automation and validation workflows (Python/Bash/Go/GitHub Actions).
About you: - BSc with expertise in cybersecurity, or equivalent cybersecurity/detection experience
- Solid understanding of OS internals (Linux/Windows), process and network behavior
- Proven ability to conduct deep investigations, document findings, and propose solutions
- Comfortable with some of the programming/scripting languages (Python, Bash, or similar)
- Fast learner, self-starter, team player with a “can-do” attitude.
- Excellent spoken and written English
Nice to Have: - Familiarity with security tools for runtime visibility or detection
- Prior exposure to threat detection or security operations
- Experience with Cloud-Native architectures (AWS/Azure/GCP) and Kubernetes
- Basic static malware analysis knowledge
- Familiarity with AI tools and frameworks (e.g. MCP, AI-driven automations)