WHAT YOULL DO
Track cyber threat activity targeting cloud environments
Build and maintain profiles of state-sponsored or financially motivated cyber threat actors
Track private and public threat intelligence feeds and sources
Investigate threats to customer environments based on analysis of product telemetry
Correlate and cross-reference intelligence from multiple sources to build a deeper understanding of threat activity
Work with the product and sales teams to provide security insights to customers and support decision-makers
Operationalize your knowledge to help build detections for emerging threats
Produce various forms of analytic reports describing threat activity and security incidents impacting customer environments
Publish your insights about the cloud threat landscape with the wider security community
5+ years experience in cyber security analysis or threat analysis
Understanding of core cybersecurity topics related to OS, networking, or cloud
Strong grasp of threat intelligence frameworks and tools, as well as cyber-attack lifecycles
High familiarity with state-sponsored and/or cybercrime threat actors
Proficiency in log analysis (KQL, Splunk, ElasticSearch, or similar)
Proficiency with scripting languages (Python, Rego, R, MATLAB or similar)
Writing skills
Application of analytic techniques to complex problems
An independent self-learner
Good communication and teamwork skills
ADVANTAGE
Experience with threat detection rule formats (YARA, SIGMA, Snort, etc.)
Data analysis experience (SQL)