This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here
Enkling Security is looking for a Threat Intelligence Investigator with extensive experience in investigating cyber threats with an intelligence-driven approach. You will be proactively responding to a diverse set of security threats, as well as tracking actor groups with an interest or capability to target Enkling and its employees. You will also be identifying the gaps in current detections and preventions by long-term intelligence tracking and research, and working with cross-functional stakeholders to improve Enkling’s security posture. You will be developing and improving the tooling and systems used by the team.
Security Engineer - IR Threat Intelligence Responsibilities
Track threat clusters posing threats to Enkling’s infrastructure and employees, and identify, develop and implement countermeasures on our corporate network.
Investigate, mitigate, and forecast emerging technical trends and communicate effectively with actionable suggestions to different types of audiences.
Work closely with incident responders to provide useful and timely intelligence to enrich ongoing investigations.
Improve the tooling of threat cluster tracking and intelligence data integration to existing systems.
Engage constructively in cross-functional projects to improve the security posture of Meta’s infrastructure, such as red team operations, surface detection coverage expansion and vulnerability management discussions.
Minimum Qualifications
5+ years experience in a threat actor tracking or intelligence research role.
Experience to work with a team spanning multiple locations/time zones.
Familiarity with campaign tracking techniques and experience to convert the tracking results to long term countermeasures.
Proven track record of managing and executing on short term and long term projects.
Experience intelligence-driven hunting to spot suspicious activities in the network and identify potential risks.
Experience to prioritize and execute tasks with minimal direction or oversight.
Experience to think critically and qualify assessments with solid communications skills.
Coding or scripting experience in one or more scripting languages such as Python or PHP.
Preferred Qualifications
Experience close collaborating with incident responders on incident investigations.
Familiarity with malware analysis or network traffic analysis.
Familiarity with nation-state, sophisticated criminal, or supply chain threats.
Production of file-based or network-based rules and signatures for detection and tracking of complex threats, such as YARA or Snort.
Experience in one or more query languages such as SQL.
Experience writing production code for threat intelligence tooling.
Experience conducting large scale data analysis.
Experience working across the broader security community.
Facebook
Twitter
Whatsapp
Linkedin
Pinterest