Назад
Company hidden
1 день назад

Staff Threat Intel Analyst (Cybersecurity)

140 400 - 372 300$
Формат работы
remote (только USA)
Тип работы
fulltime
Грейд
lead
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify RU Global, списка компаний с восточно-европейскими корнями
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Staff Threat Intel Analyst (Cybersecurity): Investigates sophisticated threat activity targeting hirify.global and its users with an accent on researching and operationalizing high-quality threat intelligence. Focus on building new threat actor tracking and detection capabilities and providing a threat-informed perspective to security initiatives.

Location: Remote, United States

Salary: USD $140,400.00 - USD $372,300.00 /Yr

Company

hirify.global is the world’s leading platform for agentic software development — powered by Copilot to build, scale, and deliver secure software.

What you will do

  • Develop and maintain subject matter expertise in a portfolio of threats to hirify.global, its customers, employees, infrastructure, and the wider OSS community.
  • Conduct technical investigations into complex threat actor activity targeting hirify.global and its users.
  • Identify and disrupt platform abuse by advanced threat actors.
  • Lead cross-org strategic projects to better understand and track threats to hirify.global and its customers.
  • Design, develop, and maintain tools and queries to assist in investigations.
  • Coordinate disruption efforts against sophisticated misuse of the hirify.global platform by advanced threat actors.

Requirements

  • 10+ years experience in security analysis, security research, cyber security, security engineering, or relevant area.
  • 5+ years of technical threat intelligence analysis and investigations experience with a focus on tracking and disrupting advanced persistent adversaries.
  • 2+ years of experience building tools and automations in collaborative codebases using Python and/or other programming languages.
  • 3+ years conducting threat investigations in high-traffic environments.

Nice to have

  • Knowledge of Linux and MacOS systems, git, and hirify.global.
  • Proficiency with Azure, KQL, Terraform, and Airflow.
  • Experience leveraging AI workflows, where appropriate, to drive improved security outcomes.
  • An existing network of threat intelligence contacts and a high degree of comfort managing information sharing relationships.
  • Proven track record of collaborating with Security Operations and Engineering teams for host and network based investigation and detections.

Culture & Benefits

  • Remote-first work environment.
  • Competitive pay.
  • Generous learning and growth opportunities.
  • Excellent benefits to support you.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →