Principal Engineer, Cloud Content (hybrid)

CrowdStrike CrowdStrike · Enterprise · Israel · Remote

Principal Engineer role focused on cloud threat detection, owning the design of cloud-native detection logic, advanced telemetry pipelines, cloud attack-surface visibility, and real-time threat-detection capabilities across public clouds. The role involves building detection-as-code frameworks, researching emerging cloud-native threats, designing scalable detection architectures, and leading complex cloud-focused investigations. It sets the technical bar for cloud detection engineering and influences platform and cloud-architecture decisions.

What you'd actually do

  1. Architect, build, and optimize cloud detection pipelines: telemetry ingestion, log processing, alerting, detection-as-code workflows, and automated analysis frameworks.
  2. Develop advanced detections for cloud-native threats: IAM misconfigurations, lateral movement across cloud services, runtime/container attacks, serverless abuse, data-exfiltration patterns, persistence mechanisms, and cloud control-plane manipulation.
  3. Lead cloud threat research: track emergent attacker tradecraft, cloud-native TTPs, abuse of managed services, supply-chain risks, ephemeral compute patterns, and multi-cloud attack surfaces.
  4. Conduct advanced investigations involving cloud logs, control-plane events, network telemetry, and container/runtime signals.
  5. Collaborate deeply with cloud engineering, platform teams, and DevOps to embed telemetry early in design — instrumentation, log generation, audit events, and detection hooks across cloud services.

Skills

Required

  • 8 to 15+ years of experience in cloud threat detection, cloud security engineering, incident response, threat hunting, or equivalent.
  • Strong expertise with AWS and at least one of Azure or GCP; deep knowledge of cloud control-plane events, service logs, runtime/container ecosystems, and network architectures.
  • Proven ability to design and deliver high-fidelity cloud detections in large-scale environments, with understanding of FP/FN trade-offs and detection-as-code methodologies.
  • Strong engineering ability: Python, Go, or equivalent languages; familiarity with CI/CD, infrastructure-as-code, and cloud automation.
  • Demonstrated ability to lead complex cloud investigations and turn findings into durable detection logic.
  • Strong understanding of cloud threat models: identity-based attacks, misconfiguration abuse, boundary-less lateral movement, data-exfiltration paths, and cloud service exploitation.
  • Ability to influence platform teams, propose architectural improvements, and advocate for telemetry and detection requirements with clear rationale and evidence.

Nice to have

  • Experience with multi-cloud detection architectures at scale.
  • Experience building detection testing frameworks or automated validation pipelines.
  • Deep familiarity with attacker tradecraft targeting cloud infrastructure.
  • Strong communication skills; concise, technical, grounded in adversary behavior and detection outcomes.

What the JD emphasized

  • cloud threat detection
  • cloud security engineering
  • incident response
  • threat hunting
  • AWS
  • Azure
  • GCP
  • cloud control-plane events
  • service logs
  • runtime/container ecosystems
  • network architectures
  • high-fidelity cloud detections
  • detection-as-code methodologies
  • Python
  • Go
  • CI/CD
  • infrastructure-as-code
  • cloud automation
  • complex cloud investigations
  • cloud threat models
  • identity-based attacks
  • misconfiguration abuse
  • boundary-less lateral movement
  • data-exfiltration paths
  • cloud service exploitation
  • multi-cloud detection architectures
  • detection testing frameworks
  • automated validation pipelines
  • attacker tradecraft targeting cloud infrastructure