Required Senior Threat Intelligence Analyst
Your Career:
The Cortex Threat Intelligence team is in charge of maintaining an up-to-date overview of the ever-changing threat landscape and its effects on the Cortex products. This includes the collection, analysis, and dissemination of technical threat intelligence from multiple internal and external sources. As part of the work, youll be in charge of automating threat intelligence processes and developing tools and methodologies to increase productivity.
Our Cortex XDR is one of the best in market XDR products, with an almost unparalleled telemetry and data lake. Our team is a very data-driven team, and as such, it is a great place for like-minded analysts who are enthusiastic about data mining, threat actors, and malware!
Your Impact:
Track and monitor the cyber threat landscape, using various sources in order to raise flags for any potential gaps and to improve Cortex XDRs security coverage
Perform in-depth intelligence research of malware/exploit techniques to provide actionable insights and suggestions on how to improve product capabilities
Analyze technical intelligence arriving from various sources and provide summaries and analyses for internal or external use – This may include releasing marketing-related materials to customers or on the companys website
Automate processes related to data collection and analysis
Support the security research teams by creating or integrating tools that simplify the research
Work closely with other teams, such as research, product development, and customer support, to communicate findings and collaborate on security improvements
Create detailed reports and documentation on threat intelligence findings and recommended actions.
Your Career:
The Cortex Threat Intelligence team is in charge of maintaining an up-to-date overview of the ever-changing threat landscape and its effects on the Cortex products. This includes the collection, analysis, and dissemination of technical threat intelligence from multiple internal and external sources. As part of the work, youll be in charge of automating threat intelligence processes and developing tools and methodologies to increase productivity.
Our Cortex XDR is one of the best in market XDR products, with an almost unparalleled telemetry and data lake. Our team is a very data-driven team, and as such, it is a great place for like-minded analysts who are enthusiastic about data mining, threat actors, and malware!
Your Impact:
Track and monitor the cyber threat landscape, using various sources in order to raise flags for any potential gaps and to improve Cortex XDRs security coverage
Perform in-depth intelligence research of malware/exploit techniques to provide actionable insights and suggestions on how to improve product capabilities
Analyze technical intelligence arriving from various sources and provide summaries and analyses for internal or external use – This may include releasing marketing-related materials to customers or on the companys website
Automate processes related to data collection and analysis
Support the security research teams by creating or integrating tools that simplify the research
Work closely with other teams, such as research, product development, and customer support, to communicate findings and collaborate on security improvements
Create detailed reports and documentation on threat intelligence findings and recommended actions.
Requirements:
Proven 4 years of experience in at least one of the following domains – threat intelligence / SOC / threat hunting / malware analysis / incident response
Knowledge and proven working experience in Python and specifically using APIs to collect data from multiple sources – A MUST
Experience in BigQuery or other SQL-based querying languages – A MUST
Well-versed in the cyber landscape, malware capabilities and attacking fundamentals
Experience in analyzing malware in a controlled lab environment, Malware analysis skills (static, dynamic) – A MUST
Ability to analyze large amounts of technical data, extract crucial details, and to draw meaningful conclusions
Ability to work independently, lead projects and bring them to fruition, while working across the company with other departments
High proficiency in English, both verbal and written
Experience in OSINT or intelligence analysis (such as military experience) an advantage.
Proven 4 years of experience in at least one of the following domains – threat intelligence / SOC / threat hunting / malware analysis / incident response
Knowledge and proven working experience in Python and specifically using APIs to collect data from multiple sources – A MUST
Experience in BigQuery or other SQL-based querying languages – A MUST
Well-versed in the cyber landscape, malware capabilities and attacking fundamentals
Experience in analyzing malware in a controlled lab environment, Malware analysis skills (static, dynamic) – A MUST
Ability to analyze large amounts of technical data, extract crucial details, and to draw meaningful conclusions
Ability to work independently, lead projects and bring them to fruition, while working across the company with other departments
High proficiency in English, both verbal and written
Experience in OSINT or intelligence analysis (such as military experience) an advantage.
This position is open to all candidates.