The Security Operations team is a central pillar of our growth strategy, and we are looking for a Threat Intelligence Analyst to help drive our vision of a proactive and predictive security posture. You’ll be at the forefront of our threat intelligence efforts, working closely with the broader threat intelligence community to gather and analyze critical data on emerging threats and trends, and using your expertise to inform our defenses and protect our customers.
As a key member of our team, you’ll take on the exciting challenge of staying one step ahead of threat actors, and your work will have a direct impact on our ability to detect and respond to potential security threats, ultimately helping to safeguard our business and customers.
What to expect:
- Analyze complex threat intelligence data to inform security decisions
- Develop and maintain relationships with key stakeholders and community partners
- Engage with internal teams to share critical threat intelligence insights
- Build and refine threat profiles to enhance our understanding of emerging threats
- Develop and deliver high-quality reports to senior leadership and other stakeholders
- Investigate and respond to community reports of potential security threats
- Perform thorough analysis of disparate threat intelligence sources
- Evaluate and prioritize threats to ensure effective risk management
- Collaborate with cross-functional teams to drive security improvements
- Stay up-to-date with the latest threat intelligence trends and technologies to continuously enhance our security posture
Our ideal candidate will have:
- 2-3 years of experience in a dynamic IT operations environment, such as a Security Operations Center (SOC), Network Operations Center (NOC), or emergency response team, with a strong foundation in IT security fundamentals and threat analysis
- Proven experience working with complex, sensitive, and potentially untrustworthy data sources, with the ability to distill insights and drive informed decision-making
- Proficiency in scripting languages, such as Python, and experience developing tools and solutions to support threat intelligence and incident response efforts
- In-depth knowledge of Unix-based operating systems, network architectures, and protocols, with the ability to analyze and interpret network traffic, system logs, and other relevant data sources
- Strong understanding of threat intelligence principles, including threat actor tactics, techniques, and procedures (TTPs), and the ability to apply this knowledge to support threat hunting, incident response, and vulnerability management efforts
- Experience with observability tools and frameworks, such as SIEM systems, threat intelligence platforms, and incident response software, with the ability to integrate and analyze data from multiple sources
- Excellent communication and interpersonal skills, with the ability to build strong relationships with cross-functional teams, including security operations, incident response, and threat intelligence teams
- A proven track record of navigating high-pressure, fast-paced environments, with the ability to make quick decisions, escalate issues, and drive complex problems to resolution in a timely and effective manner
Compensation
$85,000 – $100,000
Share
Facebook
Twitter
LinkedIn
Telegram
Tumblr
WhatsApp
VK
Mail