💼 Infrastructure Security Engineer — SonarSource SA · Geneva
S

SonarSource SA

Infrastructure Security Engineer

Temps plein
Geneva, GE
Publié le 05 May 2026
1 vues
📋

Description du poste

Offre d'emploi : Infrastructure Security Engineer -- SonarSource SA, Geneva.

Sonar prévient les problèmes de qualité et de sécurité du code. Rejoignez une équipe proactif qui valorise l'efficacité et la collaboration.
Tâches

Concevoir et maintenir des systèmes de sécurité automatisés.

Optimiser l'accès et l'automatisation des plateformes d'identité.

Utiliser des outils AI pour améliorer les opérations de sécurité.
Compétences

Expérience en ingénierie de sécurité et gestion des accès requise.

Compétences en automatisation et infrastructure as code.

Maîtrise des systèmes SIEM et de l'observabilité.
Who is Sonar?
Sonar is driving the future of agent-centric software development. As the leader in AI code review and verification, we solve a critical problem: ensuring that software generated by AI-assisted developers or autonomous agents is reliable, secure, and maintainable.
Integrating seamlessly with Claude Code, Codex, Cursor, GitHub Copilot, Gemini, and Devin, we help over 75% of the Fortune 100 build trusted, reliable, compliant software. Customers who use Sonar are 44% less likely to report an outage due to AI-generated code.
We believe code verification is the critical missing link in the Agent-Centric Development Cycle (AC/DC). Industry giants like Nvidia, ServiceNow, Booking.com, Goldman Sachs, AstraZeneca, and Ford Motor Company count on us to provide independent, explainable, consistent review and governance of their AI-generated code via products like:

SonarQube: The world’s leading AI code review and verification platform.

SonarQube Foundation Agent: Currently topping the leaderboards for agentic software repair.

SonarSweep & Sonar Context Augmentation: Providing the enterprise-grade context and constraints agents need to be truly effective.
Our team operates across global hubs in Austin, Bochum, Dubai, Geneva, London, Singapore, Tokyo, and Washington D.C. We move with a mindset we call CODE:

Committed to our customers and community.

Obsessed with quality.

Deliberate in our decisions.

Effective as one team.
With over $400M in revenue and profitable, fast-paced growth, we are building the backbone of the AI software revolution. If you’re hungry to have an impact, want to build at a fast pace, and ready to work at the forefront of AI, we want to hear from you.
The
Impact You Will Have:
We are still at the beginning of our growth journey and are continuously introducing new processes, technologies, and tools. In this role, you will:

Be a pivotal engineering contributor to the design, implementation, and operation of security controls and automation across our identity platforms, endpoints, and core IT services.

Own key parts of our
IdP and access automation stack
(e.g., SSO, SCIM, group‑based access, JIT access), ensuring that users get the right access at the right time with strong controls and auditability.

Design and maintain
security monitoring, alerting, and SIEM integrations
that give us real‑time visibility into identity, endpoint, and SaaS risks.

Partner with IT Ops, Information Security, and Infrastructure Engineering to ensure security controls are
deeply integrated into operations
(incident management, change, and problem processes), not bolted on.

Use and champion
AI tooling
to make security operations more efficient — from alert triage and runbook execution to knowledge retrieval and reporting.

Help define and improve how we measure the reliability and effectiveness of our security controls (SLIs/SLOs, error budgets, and dashboards), making risk and performance visible and actionable to stakeholders.
\n
What You Will Do Daily:

Security Monitoring, Alerting & SIEM Ownership
: Working with the Information Security team, design, implement, and maintain alerting rules, dashboards, and runbooks across our SIEM and logging platforms, with a focus on identity, access, and SaaS security signals. Continuously tune alerts to reduce noise, improve fidelity, and align with error budgets and SLOs for critical security and identity services.

Endpoint Defense In Depth:
Architect and implement our multilayer endpoint defence systems (e.g. Crowdstrike, Cyberark, Cloudflare, secure browser policies), balancing risk against usability in coordination with the Information Security team.

Identity Platform & Access Automation
: Build and maintain automation for our identity platforms (e.g., SSO, SCIM provisioning, group‑based access policies, lifecycle workflows) in partnership with Information Security. Implement guardrails and policy‑as‑code for identity, ensuring changes are reviewed, tested, and auditable before reaching production.

Infrastructure as Code & Security Controls as Code
: Use IaC and configuration management (e.g., Terraform, Ansible, or similar) plus scripting languages (e.g., Python, Go) to deploy and manage security tooling, integrations, and policies. Treat security controls (e.g., logging, scanning, hardening, secret management) as software artifacts that can be versioned, tested, and rolled back safely.

Observability & Integration with Core IT Operations
: Ensure that logging, metrics, and tracing for security‑relevant systems (IdP, VPN, endpoint protection, critical SaaS) are robust, accurate, and integrated into our observability stack. Integrate security events and automations with ITSM and incident management workflows, enabling fast routing, triage, and resolution.

Incident Response & Post‑Incident Engineering
: Participate in the on‑call rotation for relevant security and identity services. Lead or contribute to post‑incident reviews, turning root causes into preventative engineering changes (new alerts, automations, guardrails, or documentation) that reduce MTTR and recurrence.

AI‑Enabled Security Operations
: Use AI tooling (e.g., LLM‑based assistants, automation platforms) to accelerate alert triage, enrichment, and investigation, while keeping humans in control of decisions.
Identify opportunities to embed AI in security and IT operations workflows
(e.g., threat intelligence and alert correlation) and help implement these safely and effectively.
The Background You Will Need:

Security Engineering & Operations Background
: Significant hands‑on expertise (4–7 years) in security engineering, security operations, or closely related roles in modern, fast‑paced environments (e.g., SaaS, enterprise IT, cloud‑native infrastructure).

Identity & Access Management Expertise
: Practical experience operating IdPs and IAM systems at scale (e.g., Okta, Azure AD, or similar), including SSO, MFA, lifecycle management, and least‑privilege policies. Experience designing and implementing automated provisioning and deprovisioning (e.g., SCIM, HRIS integrations, group‑based and role‑based access models).

SIEM, Logging & Observability
: Proven experience with SIEM and observability platforms (e.g., ELK/EFK, Splunk, Datadog, or similar), including writing and tuning detection rules, building dashboards, and working with large‑scale log ingestion. Comfort working with SLIs/SLOs and error budgets for critical services, and using these to guide priorities for hardening and automation.

Automation & Infrastructure as Code:
Strong background with IaC and configuration management tools (e.g., Terraform, CloudFormation, Ansible, or similar) and with scripting/programming languages (e.g., Python, Go, or equivalent) to automate security and operational tasks. Track record of converting manual, repetitive operational work into
reliable automation and self‑service capabilities
.

Security Controls Implementation
: Background implementing and operating security controls as code: vulnerability scanning, configuration baselines, secret management (e.g., HashiCorp Vault), key rotation, and certificate management.

Incident Management & Cross‑Functional Collaboration
: Demonstrated experience participating in or leading incident response, root cause analysis, and post‑incident follow‑through in partnership with IT Ops, Security, and Engineering. Strong communication skills in English,
able to explain complex security and operational topics
to both technical and non‑technical audiences.

AI Fluency
: Comfortable using modern AI tooling (e.g., LLM‑based assistants, automation frameworks) as part of daily work for analysis, content generation, and workflow automation.
Ability to reason about where AI is and isn’t appropriate in security and operations
, balancing speed with risk and control.
\n
We value diversity, equity, and inclusion
At Sonar, we believe that our diversity is our strength. We are a global company that values and respects different backgrounds, perspectives, and cultures. We are committed to fostering a diverse and inclusive work environment where everyone feels valued and empowered to contribute their best. We are proud to be an equal opportunity employer and welcome all qualified applicants, regardless of race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status.
If you need any accommodation, please reach out to us at
E-Mail schreiben
.
All offers of employment at Sonar are contingent upon the results of a comprehensive background check and reference verification conducted before the start date.
We do not currently support visa candidates in the US.
Applications that are submitted through agencies or third party recruiters will not be considered.

Postulez des maintenant pour ce poste de Infrastructure Security Engineer a Geneva.

Offres similaires

Voir plus →

Du blog : conseils carrière

Voir tous les articles →

Guide pour postuler en Suisse

📄 Quels documents fournir ?
  • CV — antichronologique, photo recommandée
  • Lettre de motivation — personnalisée
  • Diplômes et certificats
  • Références professionnelles
  • Certificats de travail
🎯 Comment rédiger sa candidature ?

CV :

  • 2 pages maximum
  • Compétences linguistiques détaillées

Lettre :

  • 1 page, adressée nominativement
  • Disponibilité et prétentions salariales
⏱️ Délais de réponse
  • Accusé de réception — 2–5 jours
  • Premier retour — 1–3 semaines
  • Entretien — 2–4 semaines
  • Décision — 4–8 semaines

💡 Relancez poliment après 2 semaines sans réponse.

🌍 Travailler en Suisse en tant qu'étranger

UE/AELE :

  • Permis L (< 1 an) ou Permis B (≥ 1 an)

Hors UE/AELE :

  • Permis B demandé par l'employeur, quotas annuels
💰 Salaires et négociation
  • Salaires en brut annuel
  • 13ème salaire très courant
  • Négociation possible à l'offre

💡 Consultez jobs.ch pour les benchmarks.

💼 Préparer l'entretien
  • Renseignez-vous sur l'entreprise
  • Préparez des exemples concrets
  • Arrivez 10 minutes en avance
  • Posez des questions sur les prochaines étapes

Ils ont trouvé via CH-Jobs

Tous les avis →
MK

Marie K.

Infirmière — Genève

★★★★★

« J'ai trouvé mon poste en moins de 2 semaines. La plateforme est intuitive et les offres sont actualisées quotidiennement. »

Il y a 2 mois

JD

Jean D.

Développeur — Zurich

★★★★★

« Les alertes email m'ont permis de ne rater aucune offre. Le filtre par canton est vraiment pratique. »

Il y a 1 mois

SL

Sophie L.

Chef de projet — Lausanne

★★★★☆

« Plateforme professionnelle et efficace. Contactée par plusieurs recruteurs dès ma première semaine. »

Il y a 3 semaines

Newsletter

Recevez les dernières offres et conseils