
Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We're the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.

Orca Security is the pioneer of agentless cloud security, and is trusted by hundreds of enterprises globally. We're the industry-leading Cloud Security Platform that identifies, prioritizes, and remediates security risks and compliance issues across your cloud estate spanning AWS, Azure, Google Cloud and Kubernetes.
What they do: Agentless, unified cloud security platform (multicloud: AWS, Azure, GCP) covering vulnerabilities, misconfigurations, identity, data, API exposure and runtime protections
Founded: 2019
Headquarters: Portland, Oregon
Total funding: USD 632,000,000
Tech / differentiation: Agentless SideScanning technology and a Unified Data Model
| Company |
|---|
Cloud security for multi-cloud environments (visibility, risk prioritization, compliance, and remediation)
2019
Computer and Network Security
USD 20,000,000
USD 55,000,000
USD 210,000,000
Reported valuation around USD 1.2B
USD 550,000,000
Reported valuation around USD 1.8B
“Backed by major growth and strategic investors including GGV Capital, ICONIQ Growth, CapitalG (Alphabet), Redpoint Ventures, Temasek, Lone Pine Capital, Stripes, Adams Street Partners and others”
Big Ideas. Real People. At Orca, in the right environment and with the right team, talent has no boundaries . This team spirit, together with our drive to always aim high, has quickly earned us unicorn status and turned us into a global cloud security innovation leader. So if you're ready to join an amazing team of people who inspire each other every day, now is the time to find your place in our pod.
We're looking for driven and talented people like you to join our team and our mission to change the future of cloud security. Ready to dive in and swim with our pod? Highlights
About the role
Required Qualifications & Skills
As the Head of Research, you will lead Orca Security's threat-research, security-innovation, and vulnerability-discovery efforts. You will define the strategy for how we uncover threats, identify novel attack vectors, influence product direction, and contribute thought leadership to the cybersecurity community.You will manage and grow a team of world-class researchers, work closely with product, engineering and go-to-market teams, and ensure our research remains cutting-edge, rigorous and impactful. This role emphasizes strong people leadership and cross-functional execution, alongside technical depth and hands-on research judgment.Key responsibilities
Develop, own and evolve the research strategy by defining high value focus areas (for example misconfigurations, identity threats, workload vulnerabilities, and emerging attack techniques), and ensure alignment with Orca's product roadmap and business objectives.
Lead, coach, and mentor a multidisciplinary research team (researchers, threat analysts, and engineers). Build a healthy, high-performing org, including hiring, onboarding, and performance management.
Partner closely with product and engineering leadership to turn research insights into concrete roadmap items, detection logic, and customer value.
Drive discovery of new vulnerabilities, attack techniques, or adversary behaviors across cloud and modern infrastructure environments (for example containers, serverless, data stores, IAM).
Define metrics for research impact (for example vulnerabilities discovered, time to validate and operationalize new findings, research-driven product improvements, external reach).
Establish and maintain external partnerships (industry peers, academic groups, independent researchers) to expand Orca's capabilities and pipeline.
Publish and present research findings (blog posts, white papers, conference talks). Lead vulnerability disclosure and responsible communications.
Ensure the research function has the right infrastructure and processes (tooling, sandboxes, repeatable experimentation, documentation standards).
Stay current with the threat landscape, emerging technologies, attacker tradecraft, and relevant compliance or regulatory shifts.