About the Role
This role supports the identification and analysis of cyber threats by examining network traffic, malware samples, and security alerts to detect and mitigate potential risks.
Responsibilities
- Monitor security information and event management systems for suspicious activity
- Analyze network traffic patterns to identify potential security incidents
- Investigate malware samples using sandboxing and static analysis tools
- Classify and categorize threats based on severity and impact
- Support incident response activities with timely and accurate data
- Document findings in detailed technical reports
- Collaborate with senior analysts to refine detection rules
- Maintain up-to-date knowledge of threat actor tactics and techniques
- Assist in the development of automated threat detection scripts
- Respond to alerts within defined service level agreements
- Validate security tool configurations for optimal performance
- Track indicators of compromise across multiple data sources
- Participate in threat intelligence sharing initiatives
- Contribute to post-incident review sessions
- Escalate complex cases to higher-tier analysts
- Follow established protocols for data handling and chain of custody
- Use threat intelligence platforms to enrich investigation data
- Support vulnerability assessment efforts with threat context
- Maintain logs and records in compliance with security policies
- Attend team meetings and training sessions on emerging threats
Nice to Have
- Completion of cybersecurity certification programs
- Hands-on experience in a lab or academic security project
- Exposure to intrusion detection systems
- Familiarity with cloud infrastructure security
- Prior internship in a security operations center
- Experience analyzing packet captures
- Knowledge of YARA or Sigma rule writing
- Participation in capture-the-flag competitions
- Understanding of zero-day exploit trends
- Exposure to automated analysis pipelines
Compensation
Competitive salary and benefits package
Work Arrangement
Hybrid work model with flexible scheduling options
Team
Part of a global cybersecurity team focused on proactive threat detection and response
What We Value
- Curiosity and a proactive approach to learning new attack techniques
- Ethical responsibility in handling sensitive security data
- Team collaboration and knowledge sharing
- Resilience under pressure during active incidents
- Clear and concise technical documentation
Growth Opportunities
- Access to internal training and certification programs
- Mentorship from experienced security researchers
- Opportunities to specialize in malware reverse engineering
- Pathways to advanced roles in threat intelligence
- Exposure to global threat landscapes and campaigns
Available for qualified candidates