We’re a Bay Area Cyber AI startup. We’ve raised funding from top tier investors. Our vision is simple: enable all security teams, to perform security operations with the efficiency and effectiveness needed to prevent breaches . We’re a small team of researchers and engineers with a deep focus in cyber and AI. Our product automates the triage for any security alert leveraging deep research, big data and dozens of AI Agents.
Join us and boost your career.
The RoleAs Radiant builds its expert system AI agent to solve alert triage autonomously, the security context team is responsible for applying knowledge and testing to the agent, improving its skill, breadth, and accuracy.
In your day-to-day you will work with a team of like-minded experts and collaborate with data scientists and security researchers. You will be responsible of the system’s overall accuracy and efficacy for high-end customer environments by both providing knowledge as context, and helping tune Radiant’s AI agent.
What you'll do- You will learn from top industry thought leaders and practitioners about AI, cybersecurity, and all that is between.
- You will apply your curated knowledge of cybersecurity investigation, issues, and use cases as well as security tools, system logs, and telemetry to constantly expand both your knowledge and the product’s investigation and triage capabilities.
This is a rare opportunity to bring your SOC and detection experience into an AI-forward environment, contribute to the next evolution of security automation, and build systems used by teams around the world.
Things we’re looking for- A 4-year Bachelor of Science or equivalent degree in computer science
- A tier-3 (or equivalent) security practitioner (SOC analyst, cybersecurity vendor content engineer) with at least four years of total cybersecurity experience
- A working knowledge and best practices for alert triage and response
- Have previously worked hands-on with a variety of security technologies that are part of a service provider or enterprise security program (SIEM, IPS, WAF, EDR)
- Experience leading investigations of potential incidents across many types of detection systems and threat intelligence platforms
- Having previously worked for security product companies (startups are a plus)
- A track record of providing security subject matter expertise and guidance to people who are not security experts
- Generous equity package
- Unlimited PTO (take time when you need it)
- Great healthcare
- Stay Healthy subsidy (for gym and sports)
We’re a startup and we’re making decision quickly. Our process is designed to give you the best glimpse of our team and allow us to evaluate your technical and culture fit.
- Step 1: Executive interview + Technical interview
- Step 2: Virtual On Site: Technical and Leadership interviews
Top Skills
What We Do
Radiant Security is a SecOps platform that enables the SOC to leverage the power of AI to streamline and automate analyst workflows. This dramatically boosts SOC analyst productivity, detects significantly more real attacks by deeply investigating every incident, and drastically reduces response times.
Radiant’s AI-powered SOC co-pilot automates alert triage and incident investigation to provide unlimited capacity and to detect more real attacks. Incidents are escalated to analysts decision ready— with a complete root cause analysis and full incident scope: including affected users, hosts, applications, etc., and data stitching to follow attacks across data types. Radiant automatically generates a response plan to address each identified security issue, which can be executed manually by analysts, interactively with one-click response actions, or in a fully automated mode. The result is highly accurate triage and investigation that can scale indefinitely to handle any volume of alerts








