Cyber Threat Intelligence Engineer

Remote - Ireland

Applications have closed

Dropbox

Dropbox helps you simplify your workflow. So you can spend more time in your flow.

View company page

Role Description

Dropbox is seeking a Security Engineer to join our Threat Intelligence team. You will investigate critical threats to Dropbox and our customers, profiling threat actors and uncovering the actions, techniques and objectives of these malicious actors.    With your expertise, you will work to ensure the security of Dropbox and its customers. Aiming to protect both those who use our platform, and those who engage with it through their friends, family and colleagues. We want to ensure trust in the Dropbox platform by protecting all users interactions with our products.    In this role, you will analyze telemetry data to identify signals indicative of malicious activity and abuse. You will help enhance our capabilities by formulating new analytic techniques and working across teams to drive the supporting capabilities. We seek candidates with a deep understanding of current cybercrime and fraud actor TTPs and experience performing question-driven analysis. You will have a solid understanding of API, network and host based indicators and how to best leverage them. You are able to script and help automate recurring tasks to improve the overall effectiveness of the team. An understanding of operating systems internals will be an asset.

Responsibilities

  • Hunt for and investigate malicious activity across all Dropbox environments
  • Perform deep dive analysis of potentially malicious artifacts
  • Pursue actionable intelligence on cybercrime threats as they relate to Dropbox
  • Document and communicate investigations into threat actors, their activity, TTPs, briefing internal customers and partnering to detect, disrupt and mitigate attackers 
  • Translate actor TTPs into actionable data points to reduce overall fraud and abuse activity in Dropbox
  • Analyze large structured and unstructured data sets to identify trends and anomalies indicative of malicious activities
  • Create security techniques and automation for internal use that enable the team to operate at high speed and broad scale
  • Serve as subject matter expert on threat actors focused on Dropbox and its customers 

Requirements

  • 1-3 years of combined experience in either incident response, threat intelligence, threat hunting, or cybercrime investigations 
  • Strong demonstrated knowledge of common offensive techniques, and an in-depth knowledge of UNIX tools and architecture 
  • Experience deep/dark web forums, malware, threat modeling, security vulnerabilities, exploitation techniques, and methods for remediation 
  • Experience analyzing logs, building detections and coordinating remediation 
  • Scripting/Coding skills (e.g. Python, PowerShell, other common languages) 

Tags: APIs Automation Cyber crime Incident response Malware PowerShell Python Scripting Threat intelligence TTPs UNIX Vulnerabilities

Perks/benefits: Team events

Regions: Remote/Anywhere Europe
Country: Ireland
Job stats:  25  2  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.