Contribute to the design and operation of security controls and automation, ensuring real-time visibility into risks across identity platforms and IT services.
Security Monitoring, Alerting & SIEM Ownership: Working with the Information Security team, design, implement, and maintain alerting rules, dashboards, and runbooks across our SIEM and logging platforms, with a focus on identity, access, and SaaS security signals. Continuously tune alerts to reduce noise, improve fidelity, and align with error budgets and SLOs for critical security and identity services.
Endpoint Defense In Depth: Architect and implement our multilayer endpoint defence systems (e.g. Crowdstrike, Cyberark, Cloudflare, secure browser policies), balancing risk against usability in coordination with the Information Security team.
Identity Platform & Access Automation: Build and maintain automation for our identity platforms (e.g., SSO, SCIM provisioning, group‑based access policies, lifecycle workflows) in partnership with Information Security. Implement guardrails and policy‑as‑code for identity, ensuring changes are reviewed, tested, and auditable before reaching production.
Infrastructure as Code & Security Controls as Code: Use IaC and configuration management (e.g., Terraform, Ansible, or similar) plus scripting languages (e.g., Python, Go) to deploy and manage security tooling, integrations, and policies. Treat security controls (e.g., logging, scanning, hardening, secret management) as software artifacts that can be versioned, tested, and rolled back safely.
Observability & Integration with Core IT Operations: Ensure that logging, metrics, and tracing for security‑relevant systems (IdP, VPN, endpoint protection, critical SaaS) are robust, accurate, and integrated into our observability stack. Integrate security events and automations with ITSM and incident management workflows, enabling fast routing, triage, and resolution.
Incident Response & Post‑Incident Engineering: Participate in the on‑call rotation for relevant security and identity services. Lead or contribute to post‑incident reviews, turning root causes into preventative engineering changes (new alerts, automations, guardrails, or documentation) that reduce MTTR and recurrence.
AI‑Enabled Security Operations: Use AI tooling (e.g., LLM‑based assistants, automation platforms) to accelerate alert triage, enrichment, and investigation, while keeping humans in control of decisions. Identify opportunities to embed AI in security and IT operations workflows (e.g., threat intelligence and alert correlation) and help implement these safely and effectively.
Security Engineering & Operations Background: Significant hands‑on experience (4–7 years) in security engineering, security operations, or closely related roles in modern, fast‑paced environments (e.g., SaaS, enterprise IT, cloud‑native infrastructure).
Identity & Access Management Expertise: Practical experience operating IdPs and IAM systems at scale (e.g., Okta, Azure AD, or similar), including SSO, MFA, lifecycle management, and least‑privilege policies. Experience designing and implementing automated provisioning and deprovisioning (e.g., SCIM, HRIS integrations, group‑based and role‑based access models).
SIEM, Logging & Observability: Proven experience with SIEM and observability platforms (e.g., ELK/EFK, Splunk, Datadog, or similar), including writing and tuning detection rules, building dashboards, and working with large‑scale log ingestion. Comfort working with SLIs/SLOs and error budgets for critical services, and using these to guide priorities for hardening and automation.
Automation & Infrastructure as Code: Strong experience with IaC and configuration management tools (e.g., Terraform, CloudFormation, Ansible, or similar) and with scripting/programming languages (e.g., Python, Go, or equivalent) to automate security and operational tasks. Track record of converting manual, repetitive operational work into reliable automation and self‑service capabilities.
Security Controls Implementation: Experience implementing and operating security controls as code: vulnerability scanning, configuration baselines, secret management (e.g., HashiCorp Vault), key rotation, and certificate management.
Incident Management & Cross‑Functional Collaboration: Demonstrated experience participating in or leading incident response, root cause analysis, and post‑incident follow‑through in partnership with IT Ops, Security, and Engineering. Strong communication skills in English, able to explain complex security and operational topics to both technical and non‑technical audiences.
AI Fluency: Comfortable using modern AI tooling (e.g., LLM‑based assistants, automation frameworks) as part of daily work for analysis, content generation, and workflow automation. Ability to reason about where AI is and isn’t appropriate in security and operations, balancing speed with risk and control.
Our culture and mission set us apart. We have a dynamic work culture that values respect and kindness and embraces the right to fail (and get right back up again!).
Great people make a great company. We value people skills as much as technical skills and strive to keep things friendly while still being passionate leaders in our domains.
We have a flexible work policy that includes 3 days in-office and 2 days work-from-home each week for those located near our office locations; some locations such as Dubai, India, Japan and Australia operate fully remotely.
We have a growth mindset. We love learning and believe continuous education is critical to our success. In an ever-changing industry, new skills are necessary, and we're happy to help our team acquire them.
As the leader in our field, our products and services are as strong as our internal team members.
We embrace transparency with regular meetings, cascading messages and updates on the growth and success of our organization.
Pension Scheme: 1st Pillar (Unterstützungskasse): Automatic, financed by Sonar, 3% of gross salary, an additional benefit in addition to your salary.
Pension Scheme:2nd Pillar (bAV): Voluntary, 15% contribution by Sonar from social security savings.
We encourage usage of our robust time-off allocations with 28 PTO days for our employees based out of the Geneva region, plus additional days based on seniority and circumstances.
Sonar recognizes holidays on working calendar days. If the holiday date occurs on a Saturday, we will recognize the day on the preceding Friday. If the holiday date occurs on a Sunday, we will recognize the day on the following Monday.
Public transport reimbursement of 60% for annual subscription.
Generous discretionary Company Growth Bonus, paid annually.
Global workforce with employees in 20+ countries representing 35+ unique nationalities.
We have an annual kick-off somewhere in the world where we meet to build relationships and goals for the company.
Education Stipend
We have a growth mindset. We love learning and believe continuous education is critical to our success. In an ever-changing industry, new skills are necessary, and we're happy to help our team acquire them.
Annual global company kick-off
We have an annual kick-off somewhere in the world where we meet to build relationships and goals for the company.
28 PTO days, additional days based on seniority
We encourage usage of our robust time-off allocations with 28 PTO days for our employees based out of the Geneva region, plus additional days based on seniority and circumstances.
SonarSource builds powerful code quality and security tools that help developers prevent issues in software production. Targeting development teams and organizations of all sizes, their solutions streamline workflows and enhance productivity, leveraging both human and AI-driven contributions. With support for over 30 programming languages and widespread adoption, SonarSource is committed to creating secure, reliable, and maintainable applications.
Please mention you found this job on AI Jobs. It helps us get more startups to hire on our site. Thanks and good luck!
Understand the required skills and qualifications, anticipate the questions you may be asked, and study well-prepared answers using our sample responses.
Security Engineer Q&A's