We are still at the beginning of our growth journey and are continuously introducing new processes technologies and this role you will:
Be a pivotal engineering contributor to the design implementation and operation of security controls and automation across our identity platforms endpoints and core IT services.
Own key parts of our IdP and access automation stack (e.g. SSO SCIM groupbased access JIT access) ensuring that users get the right access at the right time with strong controls and auditability.
Design and maintain security monitoring alerting and SIEM integrations that give us realtime visibility into identity endpoint and SaaS risks.
Partner with IT Ops Information Security and Infrastructure Engineering to ensure security controls are deeply integrated into operations (incident management change and problem processes) not bolted on.
Use and champion AI tooling to make security operations more efficient from alert triage and runbook execution to knowledge retrieval and reporting.
Help define and improve how we measure the reliability and effectiveness of our security controls (SLIs/SLOs error budgets and dashboards) making risk and performance visible and actionable to stakeholders.
Security Monitoring Alerting & SIEM Ownership: Working with the Information Security team design implement and maintain alerting rules dashboards and runbooks across our SIEM and logging platforms with a focus on identity access and SaaS security signals. Continuously tune alerts to reduce noise improve fidelity and align with error budgets and SLOs for critical security and identity services.
Endpoint Defense In Depth: Architect and implement our multilayer endpoint defence systems (e.g. Crowdstrike Cyberark Cloudflare secure browser policies) balancing risk against usability in coordination with the Information Security team.
Identity Platform & Access Automation: Build and maintain automation for our identity platforms (e.g. SSO SCIM provisioning groupbased access policies lifecycle workflows) in partnership with Information Security. Implement guardrails and policyascode for identity ensuring changes are reviewed tested and auditable before reaching production.
Infrastructure as Code & Security Controls as Code: Use IaC and configuration management (e.g. Terraform Ansible or similar) plus scripting languages (e.g. Python Go) to deploy and manage security tooling integrations and policies. Treat security controls (e.g. logging scanning hardening secret management) as software artifacts that can be versioned tested and rolled back safely.
Observability & Integration with Core IT Operations: Ensure that logging metrics and tracing for securityrelevant systems (IdP VPN endpoint protection critical SaaS) are robust accurate and integrated into our observability stack. Integrate security events and automations with ITSM and incident management workflows enabling fast routing triage and resolution.
Incident Response & PostIncident Engineering: Participate in the oncall rotation for relevant security and identity services. Lead or contribute to postincident reviews turning root causes into preventative engineering changes (new alerts automations guardrails or documentation) that reduce MTTR and recurrence.
AIEnabled Security Operations: Use AI tooling (e.g. LLMbased assistants automation platforms) to accelerate alert triage enrichment and investigation while keeping humans in control of decisions. Identify opportunities to embed AI in security and IT operations workflows (e.g. threat intelligence and alert correlation) and help implement these safely and effectively.
Security Engineering & Operations Background: Significant handson experience (47 years) in security engineering security operations or closely related roles in modern fastpaced environments (e.g. SaaS enterprise IT cloudnative infrastructure).
Identity & Access Management Expertise: Practical experience operating IdPs and IAM systems at scale (e.g. Okta Azure AD or similar) including SSO MFA lifecycle management and leastprivilege policies. Experience designing and implementing automated provisioning and deprovisioning (e.g. SCIM HRIS integrations groupbased and rolebased access models).
SIEM Logging & Observability: Proven experience with SIEM and observability platforms (e.g. ELK/EFK Splunk Datadog or similar) including writing and tuning detection rules building dashboards and working with largescale log ingestion. Comfort working with SLIs/SLOs and error budgets for critical services and using these to guide priorities for hardening and automation.
Automation & Infrastructure as Code: Strong experience with IaC and configuration management tools (e.g. Terraform CloudFormation Ansible or similar) and with scripting/programming languages (e.g. Python Go or equivalent) to automate security and operational tasks. Track record of converting manual repetitive operational work into reliable automation and selfservice capabilities.
Security Controls Implementation: Experience implementing and operating security controls as code: vulnerability scanning configuration baselines secret management (e.g. HashiCorp Vault) key rotation and certificate management.
Incident Management & CrossFunctional Collaboration: Demonstrated experience participating in or leading incident response root cause analysis and postincident followthrough in partnership with IT Ops Security and Engineering. Strong communication skills in English able to explain complex security and operational topics to both technical and nontechnical audiences.
AI Fluency: Comfortable using modern AI tooling (e.g. LLMbased assistants automation frameworks) as part of daily work for analysis content generation and workflow automation. Ability to reason about where AI is and isnt appropriate in security and operations balancing speed with risk and control.
Our culture and mission set us apart. We have a dynamic work culture that values respect and kindness and embraces the right to fail (and get right back up again!).
Great people make a great company. We value people skills as much as technical skills and strive to keep things friendly while still being passionate leaders in our domains.
We have a flexible work policy that includes 3 days in-office and 2 days work-from-home each week for those located near our office locations; some locations such as Dubai India Japan and Australia operate fully remotely.
We have a growth mindset. We love learning and believe continuous education is critical to our an ever-changing industry new skills are necessary and were happy to help our team acquire them.
As the leader in our field our products and services are as strong as our internal team members.
We embrace transparency with regular meetings cascading messages and updates on the growth and success of our organization.
Pension Scheme: 1st Pillar (Unterstützungskasse): Automatic financed by Sonar 3% of gross salary an additional benefit in addition to your salary.
Pension Scheme:2nd Pillar (bAV): Voluntary 15% contribution by Sonar from social security savings.
We encourage usage of our robust time-off allocations with 28 PTO days for our employees based out of the Geneva region plus additional days based on seniority and circumstances.
Sonar recognizes holidays on working calendar days. If the holiday date occurs on a Saturday we will recognize the day on the preceding Friday. If the holiday date occurs on a Sunday we will recognize the day on the following Monday.
Public transport reimbursement of 60% for annual subscription.
Generous discretionary Company Growth Bonus paid annually.
Global workforce with employees in 20 countries representing 35 unique nationalities.
We have an annual kick-off somewhere in the world where we meet to build relationships and goals for the company.
Required Experience:
IC
Bad code is risky business. AI-generated or written by humans, Sonar ensures top-tier code quality & security. Protect your organization from bugs and vulnerabilities that jeopardize customer trust, damage your reputation, and undermine developer experience.