
Radiant Security's Adaptive AI SOC platform is designed for enterprise security teams looking to tackle 100% of the alerts they receive from any tool or sensor. Ingesting, understanding, and triaging alerts from any security vendor or data source, Radiant ensures no real threats are missed, provides automated remediation, cutting response time from days to minutes, enabling analysts to focus on true positives and proactive security. Unlike other AI SOC solutions, which are constrained to predefined security use cases, Radiant dynamically addresses all security alerts, eliminating analyst burnout and the inefficiency of switching between multiple tools. Additionally, Radiant delivers affordable, high-performance log management directly from customers' existing storage, dramatically reducing costs and eliminating vendor lock-in associated with traditional logging solutions.

Radiant Security's Adaptive AI SOC platform is designed for enterprise security teams looking to tackle 100% of the alerts they receive from any tool or sensor. Ingesting, understanding, and triaging alerts from any security vendor or data source, Radiant ensures no real threats are missed, provides automated remediation, cutting response time from days to minutes, enabling analysts to focus on true positives and proactive security. Unlike other AI SOC solutions, which are constrained to predefined security use cases, Radiant dynamically addresses all security alerts, eliminating analyst burnout and the inefficiency of switching between multiple tools. Additionally, Radiant delivers affordable, high-performance log management directly from customers' existing storage, dramatically reducing costs and eliminating vendor lock-in associated with traditional logging solutions.
Product: Agentic AI SOC / autonomous MDR platform that triages 100% of alerts and automates investigation & response
Founded: 2021
Headquarters: San Francisco, CA
Employees: 73 (reported)
Latest disclosed funding: $15M Series A (Nov 2023, led by Next47)
| Company |
|---|
Security operations automation (SOC/MDR), alert triage, incident investigation and response, and log management
2021
Computer and Network Security
$15,000,000
Participating investors named include Lightspeed Venture Partners, Acrew Capital, Uncorrelated Ventures, and Jibe Ventures; General Advance referenced as a new investor in company materials.
“Led by strategic investor Next47 with participation from multiple venture firms (Lightspeed, Acrew, Uncorrelated, Jibe Ventures)”
About Radiant Security We're a Bay Area Cyber AI startup. We've raised funding from top tier investors. Our vision is simple: enable all security teams, to perform security operations with the efficiency and effectiveness needed to prevent breaches . We're a small team of researchers and engineers with a deep focus in cyber and AI. Our product automates the triage for any security alert leveraging deep research, big data and dozens of AI Agents.
Join us and boost your career.
This is a hybrid position and we are attending the offices 3 times a week (Vila Olimpia, São Paulo, Brazil). The Role
As Radiant builds its expert system AI agent to solve alert triage autonomously, the security context team is responsible for applying knowledge and testing to the agent, improving its skill, breadth, and accuracy.
In your day-to-day you will work with a team of like-minded experts and collaborate with data scientists and security researchers. You will be responsible of the system's overall accuracy and efficacy for high-end customer environments by both providing knowledge as context, and helping tune Radiant's AI agent.
What you'll do
This is a rare opportunity to continue growing your SOC and detection skills in an AI-forward environment, contribute to the next evolution of security automation, and build systems used by teams around the world.
Things we're looking for
A tier-1 (or equivalent) security practitioner (SOC analyst, cybersecurity vendor content engineer) with at least two years of total cybersecurity experience
A working knowledge and best practices for alert triage and response
Have previously worked hands-on with a variety of security technologies that are part of a service provider or enterprise security program (SIEM, IPS, WAF, EDR)
Experience investigating potential incidents across many types of detection systems and threat intelligence platforms
Benefits
The process We're a startup and we're making decision quickly. Our process is designed to give you the best glimpse of our team and allow us to evaluate your technical and culture fit.
Previous experience working for a security product company is a plus
Strong written communication skills