Our next-gen architecture is built to help you make sense of your ever-growing data.

Watch a 4-min demo video!

Data is Never at Rest,
and Neither Are We

We’re constantly on the lookout for people who are hungry, humble, and smart. In that order. If that sounds like you, join us on our journey to revolutionize observability.

duns banner

In 2023, Dun & Bradstreet ranked Coralogix as one of the best tech startups to work for.

Join the Team

Our stateful streaming analytics approach enables teams to monitor, visualize, and alert on observability data in real-time with no reliance on storage or indexing.
We’re looking for new team members to join us in our mission to build our next-gen data-less data platform.

2K+
Global Customers
10K+
DevOps and Engineering Users
500K+
Applications Monitored
3M+
Events Processed Per Second

Our Benefits

Global Presence

With offices in Boston, Dublin, Gurgaon, London and Tel Aviv, we operate on a global scale.

Competitive Salary

We pride ourselves on rewarding great work with great compensation.

Generous Share Package

We want you to have skin in the game and share in our future success.

Commuter Benefits

We offer monthly credits for ride-sharing, parking, and public transportation to make getting to the office a breeze.

Team Events

Regular happy hours, annual company trips, and employee parties – these are just a few ways we like to keep things friendly.

Continuous Learning

We encourage everyone to continue learning new things – developing both personally and professionally.

Security Incident Responder

Delhi, India · Full-time

About The Position

Job Description

Snowbit is looking for an experienced Security Incident Responder to join our Managed Detection and Response (MDR) team. This role requires expertise in incident response, threat hunting, and forensic investigations, with a strong emphasis on cloud environments and Kubernetes. You will lead efforts to protect our customers from advanced cyber threats while contributing to the continuous improvement of Snowbit’s methodologies, processes, and technology stack.

Requirements

What You’ll Do:

  • Leverage Snowbit’s advanced MDR platform to lead large-scale incident response investigations and proactive threat-hunting initiatives.
  • Conduct log analysis, and cloud artifact reviews using EDR and similar tools depending on availability, to support incident resolution and root-cause investigations.
  • Investigate and respond to security incidents in containerized environments, with a specific focus on Kubernetes security and architecture.
  • Research evolving cyberattack tactics, techniques, and procedures (TTPs) to strengthen customer defenses and codify insights for our services.
  • Provide technical and executive briefings to customers, including recommendations to mitigate risk and enhance cybersecurity posture.
  • Collaborate with internal teams, including engineering and research, to enhance Snowbit’s MDR and incident response capabilities.
  • Partner with customer teams (IT, DevOps, and Security) to ensure seamless integration and adoption of Snowbit’s MDR services.
  • Share expertise through presentations, research publications, and participation in the global cybersecurity community.

Experience: 

  • 3-5 years in incident response, threat hunting with strong experience in cloud security (AWS, Azure, GCP) and Kubernetes environments.
  • Proven Incident response experience in complex environments.

Technical Skills:

  • Demonstrates strong expertise in understanding adversary tactics and techniques, translating them into actionable investigation tasks, conducting in-depth analysis, and accurately assessing the impact.
  • Familiarity with attack vectors, malware families, and campaigns.
  • Deep understanding of network architecture, protocols, and operating system internals (Windows, Linux, Unix).
  • Expertise in Kubernetes security, including container orchestration, workload isolation, and cluster hardening.
  • Experience securing Kubernetes infrastructure, runtime security, and security monitoring.

Problem-Solving: 

  • Ability to work independently and collaboratively in dynamic, fast-paced environments.

Communication: 

  • Excellent written and verbal communication skills to interact with technical and non-technical stakeholders.

Preferred Skills:

  • Scripting skills (e.g., Python, PowerShell)
  • Experience with Red Team operations, penetration testing, or cyber operations.
  • Hands-on knowledge of attack frameworks (e.g., MITRE ATT&CK, Metasploit, Cobalt Strike).
  • Proficiency in host forensics, memory forensics, and malware analysis.

Apply for this position

Enterprise-Grade Solution