Senior Cyber Threat Intelligence Analyst – USA
What makes the role special
About Us:
Founded in 2003 and headquartered in Singapore, Group-IB is a leading creator of cybersecurity
technologies to investigate, prevent, and fight digital crime. Combating cybercrime is in the company’s DNA, shaping its technological capabilities to defend businesses, and citizens, and support law enforcement operations.
Group-IB’s Digital Crime Resistance Centers (DCRCs) are located in the Middle East, Europe, Central Asia, and Asia-Pacific to help critically analyze and promptly mitigate regional and country-specific threats. These mission-critical units help Group-IB strengthen its contribution to global cybercrime prevention and continually expand its threat-hunting capabilities.
Each of us can help make the world a safer place. Join us!
About the role:
Group-IB Threat Intelligence is looking for a Cyber Intelligence Analyst to join our Cybercrime Research team to help us combat the cybercriminals operating in the Dark web and open sources.
The selected candidate will be responsible for covering and researching major cyber threats that pose risks to the North America region.
This individual will analyze various types of threat actors, ranging from hacktivists to Advanced Persistent Threats (APTs). The role involves leveraging both internal and external resources to investigate threats and vulnerabilities, analyzing various threat actors and their attack infrastructures, and contributing to the development of a regional Threat Landscape to support our mission of fighting cybercrime in the region.
Tasks to solve:
- Analyzing IOCs and TTPs of the Threat Actors from the Latin America Threat Landscape - important to have knowledge of prevalent threats in the region such as banking Trojan, remote access trojan, etc.
- Craft, maintain, and document detection opportunities within the Threat Intelligence platform.
- Manage information and details related to threat actors TTPs and Opsec.
- Perform necessary correlation and research to create useful, compelling, and context-rich alerts for customers.
- Pursue research into current threats and industry trends to be aware of the most up-to-date threats in North America Threat Landscape.
- Drive initiatives to create detection content based on findings stemming from threat hunts and ad hoc detection opportunities.
- Develop mitigation and countermeasure strategies from collected threat intelligence.
- Leveraging MITRE ATT&CK categorization to align observed threat actor activity to Tactics, Techniques, and Procedures (TTPs).
Qualifications:
- A genuine passion for investigating cybercrime, not just to produce reports, but to actively combat and mitigate its impact.
- Understanding and interest in the threat landscape in the North America region.
- Knowledge of global and local cyber threats, including ransomware, initial access brokers, banking trojans, remote access trojans, and fraudsters.
- Experience in analyzing the cybercrime community and profiling the threat actors.
- Deep understanding of the dark web ecosystem, including knowledge of major platforms, types of goods and services traded, market dynamics, and communication methods used within underground communities
- Basic knowledge of scripting languages (Python, Bash).
- Knowledge of network technologies and principles of functioning of data networks, understanding of the features of the common data transfer protocols.
- Knowledge of OS architecture and operating principles.
- Good interpersonal skills, as well as the ability to communicate effectively orally and in writing.
- Experience in working with the following sources: Virustotal, Urlscan, Shodan, RiskIQ, Public sandboxes
- Optionally: Group-IB or other Threat Intelligence platforms.
- Authorisation to work in the US (The role is based in the US).
What else should you know:
- Flexible schedule: Group-IB does not have fixed working hours. You choose your own schedule. We adhere to the principle advocated by Steve Jobs: “We have to work not 12 hours, and head.
- Certificates and training courses: Group-IB specialists hold over 1,000 professional certificates, including CEH, CISSP, OSCP, GIAC, MCFE, BSI, as well as some rare ones that would be a source of pride for experts in forensics, penetration testing, and reverse engineering worldwide. We have an incentive program that helps employees achieve certifications at the company's expense.
- Challenges: A wide selection of GIB programs helps you improve soft skills, gain new competencies, and receive monetary rewards.
- The initiative is rewarded: At Group-IB, you can bring your most daring ideas to life. The company encourages technical blogging, writing articles, building sports teams, and other creative activities.
