Senior Intelligence Analyst

Zscaler
2dRemote

About The Position

Zscaler accelerates digital transformation so our customers can be more agile, efficient, resilient, and secure. Our cloud native Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location. Here, impact in your role matters more than title and trust is built on results. We believe in transparency and value constructive, honest debate—we’re focused on getting to the best ideas, faster. We build high-performing teams that can make an impact quickly and with high quality. To do this, we are building a culture of execution centered on customer obsession, collaboration, ownership and accountability. We value high-impact, high-accountability with a sense of urgency where you’re enabled to do your best work and embrace your potential. If you’re driven by purpose, thrive on solving complex challenges and want to make a positive difference on a global scale, we invite you to bring your talents to Zscaler and help shape the future of cybersecurity. The Red Canary Intelligence Team conducts in-depth analysis to provide context and help prioritize where to focus detection and response efforts. As a key contributor, you will investigate raw telemetry, analyze suspicious and confirmed threats, and conduct open-source research to associate activity with known adversaries. A significant focus is on modeling and analyzing in the Synapse graph database. Curiosity, adaptability, and a passion for addressing evolving threats will be vital for success in this dynamic, mission-driven team. We're looking for an experienced Senior Intelligence Analyst to join our Intelligence team. Reporting to the Senior Manager, Intelligence, you'll be responsible for:

Requirements

  • Strong analytical and problem-solving skills, including the ability to synthesize complex and contradictory information, specifically through utilizing graph databases, or with query languages and data platforms such as SQL, Splunk, Elasticsearch, or Synapse Storm
  • Knowledge of cyber threat intelligence concepts including attribution, group naming, making assessments, and pivoting. Familiarity with the mechanics of attack behaviors and MITRE ATT&CK ®.
  • Experience tracking adversaries, including threat groups, activity groups, or malware families, and ability to differentiate unique and shared characteristics of clusters.
  • Outstanding communication skills, both written and verbal, including the ability to communicate technical concepts in a clear, succinct fashion to subject matter and non-subject matter experts alike.
  • Experience in Intelligence, Security Operations Center (SOC), Digital Forensics and Incident Response (DFIR), or other security-focused roles

Nice To Haves

  • Proven leadership mentoring team members and contributing to the development of intelligence analysis expertise.
  • Experience in threat hunting, endpoint telemetry analysis, and/or Detections Development.
  • Experience performing dynamic analysis and triage on suspected malicious samples for the purpose of confirming malicious behavior and to extract relevant indicators of compromise and other findings

Responsibilities

  • Utilizing Synapse and Storm Query Language for data modeling and analytic workflows to identify patterns and trends that can be disseminated to customers
  • Investigating telemetry to identify new activity clusters based on analysis of malicious and suspicious behaviors and activity observed across our customer base
  • Conducting open and closed source research to analyze threat patterns and trends, writing actionable intelligence products to customers and the community to communicate TTPs, detection coverage, and remediation strategies
  • Actively engaging with internal teams, external partners, customers, and the infosec community to share knowledge and enhance collaboration
  • Validating Red Canary’s endpoint, cloud, and identity detection coverage against the continuously evolving threat landscape and identify unique or emerging threats to build detection coverage for. Recommending solutions to visibility gaps in telemetry and data sources

Benefits

  • Various health plans
  • Time off plans for vacation and sick time
  • Parental leave options
  • Retirement options
  • Education reimbursement
  • In-office perks, and more!

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

5,001-10,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service