Nebius logo

Senior Security Solutions Engineer

Verified
Nebius
full-time

About the Role

<div class="content-intro"><p><strong data-stringify-type="bold">Why work at Nebius<br></strong>Nebius is leading a new era in cloud computing to serve the global AI economy. We create the tools and resources our customers need to solve real-world challenges and transform industries, without massive infrastructure costs or the need to build large in-house AI/ML teams. Our employees work at the cutting edge of AI cloud infrastructure alongside some of the most experienced and innovative leaders and engineers in the field.</p> <p><strong>Where we work<br></strong>Headquartered in Amsterdam and listed on Nasdaq, Nebius has a global footprint with R&amp;D hubs across Europe, North America, and Israel. The team of over 1400 employees includes more than 400 highly skilled engineers with deep expertise across hardware and software engineering, as well as an in-house AI R&amp;D team.</p></div><h3><strong><span data-contrast="auto">The role</span></strong><span data-ccp-props="{}">&nbsp;</span></h3> <p><span class="TextRun SCXW44234315 BCX0" lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW44234315 BCX0">We are s</span><span class="NormalTextRun SCXW44234315 BCX0">eeking a </span></span><span class="TextRun MacChromeBold SCXW44234315 BCX0" lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW44234315 BCX0">Se</span><span class="NormalTextRun SCXW44234315 BCX0">nior Security </span><span class="NormalTextRun SCXW44234315 BCX0">Solutions </span><span class="NormalTextRun SCXW44234315 BCX0">Engineer</span></span><span class="TextRun SCXW44234315 BCX0" lang="EN-GB" data-contrast="auto"><span class="NormalTextRun SCXW44234315 BCX0"> with a strong background in strategic solution evaluation, vendor assessment, and hands-on Proof-of-Concept (PoC) validation. This role is a crucial bridge between </span><span class="NormalTextRun SCXW44234315 BCX0">identifying</span><span class="NormalTextRun SCXW44234315 BCX0"> customer security requirement</span><span class="NormalTextRun SCXW44234315 BCX0">s and implementing best-in-class, enterprise-grade solutions. You will </span><span class="NormalTextRun SCXW44234315 BCX0">be responsible for</span><span class="NormalTextRun SCXW44234315 BCX0"> defining the criteria, researching the market, and executing technical validation for all major security tooling and services adopted by the c</span><span class="NormalTextRun SCXW44234315 BCX0">ompany</span><span class="NormalTextRun SCXW44234315 BCX0">.</span></span><span class="EOP SCXW44234315 BCX0" data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></p> <p><strong><span data-contrast="auto"><span data-ccp-charstyle="Strong">Key responsibilities</span><span data-ccp-charstyle="Strong">:</span></span></strong><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true}">&nbsp;</span></p> <p><strong><span data-contrast="none"><span data-ccp-parastyle="heading 4">1. Strategic Research &amp; Requirement Definition</span></span></strong><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:319,&quot;335559739&quot;:319}">&nbsp;</span></p> <ul> <li><strong><span data-contrast="auto">Threat-to-Solution Mapping:</span></strong><span data-contrast="auto"> Proactively analyze customer expectations, regulatory/compliance drivers, and threat models to define precise functional and non-functional requirements for new security solutions.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></li> <li><strong><span data-contrast="auto">Market Analysis &amp; Scouting:</span></strong><span data-contrast="auto"> Conduct thorough market scans to identify cutting-edge security products, platforms, and vendors across key domains (e.g., CSPM/CNAPP, DLP, IAM/IGA, EDR/XDR, data security, Kubernetes security, and AI/ML security).</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></li> <li><strong><span data-contrast="auto">Vendor Due Diligence:</span></strong><span data-contrast="auto"> Evaluate potential vendors based on technical capability, security posture, integration requirements, roadmap, data residency/compliance, and support quality, and shortlist candidates for the PoC phase.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="none"><span data-ccp-parastyle="heading 4">2. Technical Validation &amp; Proof-of-Concept (PoC) Leadership</span></span></strong><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:319,&quot;335559739&quot;:319}">&nbsp;</span></p> <ul> <li><strong><span data-contrast="auto">PoC Planning &amp; Design:</span></strong><span data-contrast="auto"> Develop detailed, objective, and threat-aligned test plans and success criteria for all security solution Proof-of-Concepts (PoCs), including quantitative success metrics, coverage of key attack scenarios, and opportunities for automation.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></li> <li><strong><span data-contrast="auto">Hands-on Environment Setup:</span></strong><span data-contrast="auto"> Independently architect and deploy isolated PoC environments that accurately simulate our production infrastructure (e.g., setting up cloud VPCs, Kubernetes clusters, integrating with test data via IaC, and mimicking typical workloads).</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></li> <li><strong><span data-contrast="auto">Testing &amp; Analysis:</span></strong><span data-contrast="auto"> Execute security research methodologies within the PoC (e.g., simulating attack scenarios, conducting deep feature validation, assessing false positive/negative rates) to rigorously test the vendor solution's effectiveness.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></li> <li><strong><span data-contrast="auto">Artifact Generation:</span></strong><span data-contrast="auto"> Document all findings, including technical performance data, integration challenges, security gaps discovered, and clear comparative analysis metrics.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559738&quot;:240,&quot;335559739&quot;:240}">&nbsp;</span></li> </ul> <p><strong><span data-contrast="none"><span data-ccp-parastyle="heading 4">3. Decision Support &amp; Communication</span></span></strong><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;

Related Searches

Explore more opportunities matching this role's title, location, and skills.

Job Title PagesLocation PagesCompany PagesSkill Pages

Ready to apply?

Click below to apply directly on Nebius's careers page.

Get the top 10 hyper-growth roles delivered to your inbox every Tuesday.