Principal Security Research Engineer
Listed on 2026-03-02
-
IT/Tech
Cybersecurity, Data Engineer
Spy Cloud is on a mission to make the internet a safer place by disrupting the criminal underground. Spy Cloud’s solutions thwart cyberattacks and protect more than 4 billion accounts worldwide. Cybersecurity is an exciting, evolving space, and being at the forefront of the fight to disrupt cybercrime makes Spy Cloud a special place to work. If you’re driven to align your career with a fantastic mission, look no further!
The ideal candidate possesses a strong understanding of building internal security tooling and data pipelines using public cloud infrastructure, leveraging AI technologies. This role will be within Spy Cloud Labs, Spy Cloud’s in-house Security Research team, and focus on building automation and other internal tooling to facilitate the collection of recaptured third‑party breach and malware data. This is a full‑time remote role supporting a hybrid workforce.
WhatYou'll Do
- Design, implement, and maintain internal tooling for acquiring and parsing recaptured underground data.
- Build and deploy cloud infrastructure using Infrastructure as Code technologies.
- Build and deploy automated CI/CD pipelines to test and deploy tooling and infrastructure.
- Collaborate directly with the research team to support the targeting and collection of new data sources.
- Be the subject‑matter expert on Security Research Engineering and the data acquisition process.
- Leverage modern AI and LLM‑based tooling to streamline development and collection workflows.
- Constantly and independently work to identify improvements and automation opportunities in the recaptured data workflow and ETL pipelines.
- Participate in security research including investigation of threat actors, malware, and other critical research in support of Spy Cloud’s priorities.
- Mentor junior security researchers and engineers, including providing code review and guidance on efficient code writing and professional development.
- 6+ years experience in a Senior role within cybersecurity engineering.
- 6+ years of professional software development experience, preferably in the cybersecurity industry.
- Experience implementing AI/ML in data processing applications.
- Highly skilled with Python. Golang proficiency a plus.
- Experience building internal tooling and deploying using Infrastructure as Code technologies (we use Terraform and Ansible).
- Bachelor’s degree, or equivalent experience, in Math, Science, Engineering, or Business fields.
- Self‑directed with the ability to identify and deliver on tasks without needing direct supervision.
- Critical thinker who is comfortable supporting collaborative problem solving in a team environment.
- Highly self‑motivated, empathetic, curious, and flexible.
- Experience working with large enterprises in the delivery of security analytics products.
- Experience in acquiring and processing malware‑exfiltrated data.
- Experience in using data science to analyze datasets for the purposes of detecting fraud or cyberthreats.
- Experience with databases (relational or No
SQL) and designing efficient database architecture.
-Based Benefits + Perks (for Full Time Employees)
- 401(k) with Employer Contribution
- Health, Vision, and Dental Insurance
- Health Savings Account (HSA) available with Employer Contribution
- Employer Paid Life, Short‑term, and Long‑term Disability Insurance
- Generous PTO Plan and 16 paid holidays per year
-Based Benefits + Perks (for Full Time Employees)
- Retirement Savings Plan with Employer Contribution
- Employer Provided Private Health Insurance and Healthcare Cashplan
- Employer Paid Life Insurance and Income Replacement
- Generous Holiday Plan and 14 paid holidays per year
Spy Cloud transforms recaptured darknet data to disrupt cybercrime. Its automated identity threat protection solutions leverage advanced analytics and AI to proactively prevent ransomware and account takeover, detect insider threats, safeguard employee and consumer identities, and accelerate cybercrime investigations. Spy Cloud's data from breaches, malware‑infected devices, and successful phishing also powers many popular dark web monitoring and identity theft protection offerings.
Customers include seven of the Fortune 10, along with…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).