Expoint – all jobs in one place
Finding the best job has never been easier
Limitless High-tech career opportunities - Expoint

ORCA Security Cloud Security Detection Analyst 
Israel, Tel-Aviv District, Tel-Aviv 
431259841

Today
Highlights:
  • High growth: In just six years, we’ve reached milestones that take other companies a decade or more. We’ve doubled our employee count, tripled our customer count, and rapidly expanded our product capabilities.
  • Disruptive innovation: Our founders saw that traditional security didn’t work for the cloud so they set out to carve a new path. We’re relentless pioneers who invented agentless technology and continue to be the most comprehensive and innovative cloud security company.
  • Well-capitalized: With a valuation of $1.8 billion, Orca is a cybersecurity unicorn dominating the cloud security space. We’re backed by an impressive team of investors such as Capital G, ICONIQ, GGV, and SVCI, a syndicate of CISOs who invest their own money after conducting their due diligence.
  • Respectful and transparent culture: Our executives pride themselves on being accessible to everyone and believe in sharing knowledge with the employees. Each employee has a place in shaping the future of our industry.
About the role:

Our sensor delivers deep runtime visibility across cloud environments, spanning processes, syscalls, network activity, operating systems, and containerized workloads. As a Detection Analyst, you will examine this data at scale, refine detections, surface suspicious behaviors, and collaborate with the research team to continuously improve our security outcomes.

On a typical day you’ll:
  • Examine runtime events and security findings collected by the Orca Sensor to identify patterns, anomalies, and potential threats.
  • Tune detection logic to reduce false positives and improve accuracy.
  • Investigate alerts from real customer environments and propose improvements.
  • Work closely with the research team to refine existing detections and provide insight for new ones.
  • Partner closely with field teams and product managers – managing requests, sharing findings, and keeping everyone aligned.
  • Produce short internal or external updates on relevant security trends or incidents.
  • Use Elasticsearch to explore detection data and visualize trends.
  • Contribute to detection automation and validation workflows (Python/Bash/Go/GitHub Actions).
About you:
  • BSc with expertise in cybersecurity, or equivalent cybersecurity/detection experience
  • Solid understanding of OS internals (Linux/Windows), process and network behavior
  • Proven ability to conduct deep investigations, document findings, and propose solutions
  • Comfortable with some of the programming/scripting languages (Python, Bash, or similar)
  • Fast learner, self-starter, team player with a “can-do” attitude.
  • Excellent spoken and written English
Nice to Have:
  • Familiarity with security tools for runtime visibility or detection
  • Prior exposure to threat detection or security operations
  • Experience with Cloud-Native architectures (AWS/Azure/GCP) and Kubernetes
  • Basic static malware analysis knowledge
  • Familiarity with AI tools and frameworks (e.g. MCP, AI-driven automations)