Threat Intelligence Engineer
Lisbon-remote
Threat Intelligence Collection and Analysis: Collect threat data from various sources (open, commercial feeds and internal logs, etc.), look for patterns, trends, and potential attacks.
Indicator of Compromise (IOC) Analysis: Identify, extract, and analyze IOCs from a variety of sources (e.g., malware samples, network traffic, security alerts), compare to threat reporting data, threat detection and events.
Risk Assessment: Evaluate risks based on identified threats that may harm the firm in terms of likelihood and impact level.
Threat Mitigation: Build and enforce measures of active security that could limit exposure to recognized threats.
Incident Response: During attacks occurring, give meanings as well as insights via aiding in incident response efforts.
Collaboration: Communicate findings and recommendations about cyber-threats effectively to relevant entities or people
Continuous research: Conduct research continuously on emerging risks, attack strategies, and malicious agents.
Requirements
2-4 years of hands-on experience in a cybersecurity or threat intelligence role.
Proficiency in using SIEM, EDR, and cloud security platforms (e.g., Splunk, Microsoft Defender, Cybereason, GCP, Azure or other).
Experience analyzing Indicators of Compromise (IOCs).
Experience working in a Security Operations Center (SOC) environment.
Collaboration with security analysts and incident responders.
Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
Networking: Understanding of fundamental networking concepts (TCP/IP, DNS, HTTP).
Operating Systems: Familiarity with common operating systems (Windows, Linux, macOS).
Security Fundamentals: Basic knowledge of security concepts and terminology (firewalls, intrusion detection, malware).
SIEM & EDR Tools: Experience with SIEM and EDR tools such as Splunk, Microsoft Defender, and Cybereason.
Scripting: Ability to write basic scripts in Python, Bash, etc. for automation and data analysis.
Threat Frameworks: Understanding of common attack frameworks (MITRE ATT&CK) and threat intelligence sharing standards (STIX, TAXII).
Cloud Security: Experience with cloud security services (GCP Security Center, Azure Security).
Log Analysis: Ability to analyze security logs and identify potential threats.
Threat Intelligence: Familiarity with threat intelligence platforms (TIPs) and open-source intelligence (OSINT) gathering techniques.
Scripting Proficiency: Proficiency in scripting languages (Python, Bash, etc.) for automation and data analysis.
Threat Identification: Ability to correlate information from multiple sources to identify emerging threats and Indicators of Compromise (IOCs).
Threat Hunting & Incident Response: Proficiency in threat hunting and incident response procedures.
Continuous Learning: Ability to stay abreast of the latest threat trends and emerging technologies.
Competitive salaries based on your professional experience
Meals Allowance
Fast growing international company with stable employment
Annual vacation of 22 working days and 1 additional day off on your birthday
Healthcare Insurance
Mental Wellbeing Program – the opportunity for free psychological counseling for you and your family members 24/7 hotline and online sessions
AUTODOC Corporate Discount (1,080 Euros per annum) to order parts for their own use at special discounted rate
Retail discounts of up to 75% on travel, technology, fashion and much more
Opportunities for advancement, further trainings (over 650 courses on soft and hard skills on our e-learning platform) and coaching
Free English and German language classes
Referral Program with attractive incentives
Flexible working hours and hybrid work
Join us today and let’s create a success story together!
* Salary range is an estimate based on our AI, ML, Data Science Salary Index 💰
Tags: Azure Computer Science Data analysis GCP Linux Open Source Python Research Security Splunk
Perks/benefits: Flex hours Flex vacation Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.