
Crogl is the only autonomous knowledge engine for security operations. It investigates every alert and executes threat hunts by continuously learning your processes with speed, consistency, and depth. Our mission: Enable every security analyst be effective as the entire team. What can Crogl do for you? Autonomous Alert Investigations: Our AI system handles the triage and investigation of every alert, requiring no pre-written playbooks. Threat Hunting: Auto-threat hunt with simple instructions or connect Crogl to your threat intel platform to auto execute intel report based threat hunts. Re-analyze old alerts: Got new data or not sure of response quality? Crogl can re-analyze old alerts with depth and completenss. Integration with Existing Tools: Crogl integrates smoothly with your current security ecosystem, ensuring compatibility and ease of use. Crogl serves: Sophisticated security teams who want deep and consistent response Managed security service providers who want transparency and repeatability Small security teams with limited time and too many things to do Get started Crogl installs easily in your private cloud or on-prem. Contact sales@crogl.com www.crogl.com

Crogl is the only autonomous knowledge engine for security operations. It investigates every alert and executes threat hunts by continuously learning your processes with speed, consistency, and depth. Our mission: Enable every security analyst be effective as the entire team. What can Crogl do for you? Autonomous Alert Investigations: Our AI system handles the triage and investigation of every alert, requiring no pre-written playbooks. Threat Hunting: Auto-threat hunt with simple instructions or connect Crogl to your threat intel platform to auto execute intel report based threat hunts. Re-analyze old alerts: Got new data or not sure of response quality? Crogl can re-analyze old alerts with depth and completenss. Integration with Existing Tools: Crogl integrates smoothly with your current security ecosystem, ensuring compatibility and ease of use. Crogl serves: Sophisticated security teams who want deep and consistent response Managed security service providers who want transparency and repeatability Small security teams with limited time and too many things to do Get started Crogl installs easily in your private cloud or on-prem. Contact sales@crogl.com www.crogl.com
Product: Autonomous knowledge engine for security operations that investigates alerts and executes threat hunts
HQ: Albuquerque / Los Ranchos, New Mexico
Founders: Monzy Merza, David Dorsey, Brad Lovering
Recent raise: $25M Series A led by Menlo Ventures (part of $30M total reported)
Deployments: Customer-managed; deployable on-prem, cloud, or air-gapped environments
| Company |
|---|
Security operations (alert triage, investigation, and threat hunting)
Computer and Network Security
$25M
$5M
“Series A led by Menlo Ventures with participation reported from AV8 Ventures and S3 Ventures”
Senior Security Researcher Full time, Remote Join Crogl and be at the forefront of revolutionizing security operations with AI. As a Senior Security Researcher, you will focus on vulnerability research, detection engineering, and threat intelligence to strengthen our security posture and enhance our AI-driven security solutions. * Conduct in-depth vulnerability research across various platforms, systems, and applications * Develop and implement detection rules and signatures for emerging threats * Analyze malware, exploits, and attack techniques to understand their mechanics and impact * Create and refine detection engineering methodologies to improve threat hunting capabilities * Research and document new attack vectors and exploitation techniques * Collaborate with SOC teams to implement effective detection strategies * Develop proof-of-concept exploits to validate vulnerabilities * Contribute to threat intelligence by tracking threat actor behaviors and TTPs * Document findings in comprehensive technical reports for internal teams and clients * Participate in incident response activities when needed * 5+ years of experience in a SOC Analyst role or similar security operations position * Proven experience in vulnerability research and exploit development * Strong understanding of detection engineering principles and practices * Proficiency in scripting languages such as Python, PowerShell, or Bash * Experience with SIEM platforms, EDR solutions, and security analytics tools * Knowledge of MITRE ATT&CK framework and its application in security operations * Familiarity with AI/ML concepts as applied to security detection and response * Experience with threat hunting methodologies and tools * Strong analytical skills and attention to detail * Excellent written and verbal communication skills * Experience with reverse engineering and binary analysis * Familiarity with cloud security and containerization technologies * Knowledge of AI/ML vulnerabilities and attack vectors * Experience with security automation and orchestration Bachelor’s degree in a Cyber Security Field or equivalent.