7AI is the first agentic security platform that harnesses the speed, swarming capabilities, and power of AI to finally give defenders the advantage over evolving threats. The 7AI Agentic Security Platform makes decisions and acts
autonomously to achieve specific cybersecurity goals without human intervention.
Founded by world-renowned cybersecurity experts Lior Div and Yonatan Striem Amit and backed by Greylock Partners, CRV, and Spark Capital, 7AI is leading the agentic security revolution. Learn more at 7ai.com.
7AI is the first agentic security platform that harnesses the speed, swarming capabilities, and power of AI to finally give defenders the advantage over evolving threats. The 7AI Agentic Security Platform makes decisions and acts
autonomously to achieve specific cybersecurity goals without human intervention.
Founded by world-renowned cybersecurity experts Lior Div and Yonatan Striem Amit and backed by Greylock Partners, CRV, and Spark Capital, 7AI is leading the agentic security revolution. Learn more at 7ai.com.
What: Agentic security platform using swarming AI agents for autonomous alert triage, investigation, correlation, and response
Founders: Lior Div (CEO) and Yonatan Striem-Amit (CTO), previously co‑founders of Cybereason
Founded / HQ: Founded 2024, headquartered in Boston, Massachusetts
Funding: Announced $130M Series A led by Index Ventures; company-stated total funding $166M
Related Companies
Company
HQ
Industry
Total Funding
Rhino Federated Computing
🇺🇸US
Data and AnalyticsDeepTechHealthInformation TechnologySoftware
-
MIND
🇺🇸Seattle, US
Data and AnalyticsDeepTechInformation TechnologySecuritySoftware
$41M
Zenity
🌍Undisclosed
Information TechnologySecurity
-
Sprout.ai
🇬🇧GB
Finance
$24M
Radiant Security
🇺🇸US
Information TechnologySecuritySoftware
$15M
Company Overview
Problem Domain
Enterprise cybersecurity operations (alert triage, investigation, correlation, and response).
Founded
2024
Industry
Computer and Network Security
Funding Track Record
Series A
130M
Company announcement states this Series A brought total funding to $166M.
Investor Signal
“Backed by venture investors including Greylock Partners, CRV, Spark Capital, Index Ventures, and participation from Blackstone Innovations Investments”
Founders
What we do
Join the Team
Security Analyst - Tier 3
HybridBoston, MA, US
Hybrid • Boston, MA, US
7AI is on a mission to put swarming AI agents in the hands of defenders to offload non-human work, shift people up, and finally focus on achieving the security outcomes that teams have been searching for. We are seeking curious, detail-oriented, technical experts who thrive on solving complex, high-stakes puzzles and are deeply customer-obsessed to continue our mission of building the world’s first Agentic Security Platform.
As a Tier 3 Security Analyst at 7AI, you will serve as the technical leader and point of escalation for junior analysts who are analyzing and triaging 7AI Agents’ investigations, identifying correct execution, and reducing risk for customers. You will retrospectively prove the maliciousness of threats that were stopped to help customers understand the gravity at which our service is working for them. You will help architect scalable processes to build high-functioning systems, while remaining resilient and vigilant in the face of adversarial threats. You will use your expertise of various data sources to perform investigations ad hoc, pulling data to support incident investigation as they are happening, and hunt for malicious activity in customer environments.
What You’ll Do
Required Qualifications
5+ years of experience in cyber security operations
Hands-on experience with investigating alerts and across multiple sources (endpoint, network, identity, email, cloud, etc.)
Preferred Qualifications
Prior experience in a Managed Services environment
Incident Handling experience
Relevant certifications: Security+, GSEC, GCIH
Teeming tracks opportunities at over 24,000 AI startups, then works with you to find (and land) the one you'll love.
Machine Learning Engineer
InternshipNew York, US
Internship • New York, US
Technical Writer
ContractNovi Sad, RS
Contract • Novi Sad, RS
Mobile Developer
Full-timeBelgrade, RS
Full-time • Belgrade, RS
Frontend Developer
ContractSan Francisco, US
Contract • San Francisco, US
Technical Writer
Part-timeHaifa
Part-time • Haifa
DevOps Engineer
InternshipManchester, GB
Internship • Manchester, GB
Analyze and validate investigations completed by the AI Agents for accuracy and completeness, evaluating risk
Lead and mentor junior analysts and serve as the technical expert and key escalation point for investigations
Correlate data from various data sources including cloud, endpoint, identity, network, etc. to understand that full picture of a malicious activity
Investigate malicious activity that the 7AI Agents responded to and understand the complexity of the attack that was stopped including the risk that was prevented for customers
Use our advanced AI Agents to hunt in customer environments to detect and remediate emerging threats, ultimately contributing to detections that will be folded back into the product
Assist customers with ongoing threat monitoring, triage, and prioritization of security alerts as needed but especially during incidents to resolve threats and secure the environment
Proactively identify potential threats and anomalies in customer environments by reviewing logs and malicious findings
Utilize your supreme communication skills to engage with customers who vary in their level of technical depth and focus (from SOC analysts to CISOs)
Architect processes while we build out this elite organization to scale the operation sustainably while maintaining consistent quality
Collaborate with the Sales, Engineering, and Product teams, providing feedback on the customer experience and assist in optimizing and tuning the AI platform
Stay current with emerging cybersecurity trends, vulnerabilities, and new attack techniques, especially the field of AI-driven attacks
Experience analyzing and investigating security alerts from multiple sources, including intrusion detection systems, network monitoring tools, and endpoint protection platforms
Strong knowledge of common attack techniques and frameworks (MITRE ATT&CK) and incident triage methodologies
Strong analytical and problem-solving skills, with the ability to verify AI-driven analysis and make independent security decisions
Data querying experience with SIEM querying technologies (SPL, KQL, FQL, SQL, etc) and familiarity with log / telemetry concepts
Strong knowledge with Malware Analysis methods
Great interpersonal skills with a service oriented mindset
Proven track record of successfully collaborating in a team, including mentorship skills and ability to teach complex concepts