About The Position

Who are we?

Skai (formerly Kenshoo) is a leading omnichannel marketing platform that leverages advanced AI and machine learning to deliver intelligent solutions based on data with performance media, enabling smarter decision-making, increased efficiency, and maximized returns - Revenue enabler for businesses around the world. Its partners include Google, Meta, Amazon, and Microsoft and more. ~$7 billion in ad spending is managed on the SkaiTM platform every year.

Established in 2006, We’re 700 employees strong. We work hybrid with a great home/ office work mix.


What will you do?

As a Cyber Security Engineer at Skai, you’ll play a key role in protecting our global platform and ensuring the resilience of our systems against emerging threats. You’ll be responsible for investigating and responding to security incidents, analyzing malware, and conducting threat hunting activities across cloud environments.

You’ll collaborate closely with the Infosec team, engineers, and cross-functional stakeholders to detect, contain, and mitigate threats, while continuously improving our security posture.

As part of a strong, experienced team, you’ll contribute to design, shape and implement information security solutions, mentor others in best practices, and drive automation initiatives to streamline detection and response.

Responsibilities:

  • Develop and maintain automation scripts in Python to enhance SOC efficiency and incident response workflows.
  • Perform initial triage and assessment of security incidents, identifying threats and recommending mitigation strategies.
  • Conduct static and dynamic analysis to uncover malicious behaviours, code, and techniques.
  • Apply forensic methodologies to extract, analyze, and interpret digital evidence to support investigations and attribution.
  • Investigate and mitigate cloud-based threats, with a focus on AWS environments.
  • Collaborate with cross-functional teams to strengthen overall organizational security and ensure best practices.

Requirements

  • At least 3 years of hands-on experience in SOC with a focus on incident response.
  • Strong knowledge of malware analysis techniques, digital forensics, and network traffic analysis.  Hands-on experience with SIEM, EDR, and threat intelligence platforms (Palo Alto experience – strong advantage).
  • Proficiency in scripting languages (Python, JavaScript) for automation and custom tooling.
  • Familiarity with AWS cloud environments and related security monitoring/logging services.
  • Experience with Linux OS.
  • Experience with CI/CD tools and infrastructure-as-code: Jenkins, GitHub Actions, Pulumi, Terraform.
  • Excellent teamwork, communication, and leadership skills, with the ability to guide others under pressure.
  • Ability to self-learn quickly, adapt to evolving threats, and maintain high standards of service.

Preferred:

  • Advanced knowledge of Palo Alto Cortex and XSIAM.
  • Background in cloud forensics and advanced threat hunting.
  • Certifications such as CISSP, or AWS Security Specialty.
  • GenAI experience.
  • B.Sc. in Computer Science, Cyber Security, or related field.

Apply for this position

Click on the button to load the form

More Information