Threat Intelligence Analyst

Sydney

Applications have closed

UpGuard, Inc.

Third-party risk and attack surface management software. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day.

View company page

Who are we?
UpGuard’s mission is to protect the world’s data. We obsessively seek out elegant, robust ways to enable our customers to find, acknowledge, and remediate cyber risk. With UpGuard, organizations leverage our security expertise and software to automate what were once laborious, spreadsheet-driven processes–whether it's monitoring the attack surface of hundreds of vendors or assessing the security of their own infrastructure. UpGuard is used by some of the world’s largest, fastest growing and most innovative companies. 
Why are we hiring this role?
UpGuard provides a Data Leaks service to our customers and with our current growth, are looking for someone to come on board and own the data leaks program for enterprise customers. You will be responsible for using our proprietary leak detection engine to detect and investigate customers' potential leaks of credentials, personal information, and business secrets. 
As part of our team, you'll work with other researchers to improve our leak detection methodologies, and interact with customers to understand their risks and guide leak remediation. You are as comfortable investigating large data collections on a computer as you are in front of stakeholders.

What will you accomplish?

  • Research and evaluate new vectors which may lead to unnecessary data exposure
  • Develop, create systems and utilise in-house tools to discover, analyse and evaluate potential external  exposures of customers/prospects
  • Research,  evaluate, review inefficiencies and report on potential exposures for customers, prospects and partnered organisations
  • Work with customers and prospective customers to determine their required solutions and scope
  • Identify, investigate and analyse prospects and customers business processes, procedures and work practices to determine risks
  • Identify and evaluate inefficiencies in customer vendor/security management process/practises/system functionality
  • Formulate product requirements based on user feedback
  • Create user and training documentation for customers and conduct user groups/training when required
  • Lend expertise, advice and recommendations to media and governmental organisations on the subject of data exposure and breaches
  • Manage and organise large amounts of data gathered from multiple sources and analyse it for risks posed to our customers

What do we need from you?

  • Strong understanding of concepts in information security and knowledge of issues in cloud computer security
  • Familiarity with methods for reconnaissance using OSINT
  • Experience identifying and analyzing data exposures with an awareness of rules for responsible disclosure
  • Understand how to discover, identify, and attribute sensitive data in public code repositories, cloud storage containers, exposed databases and misconfigured websites
  • Keen ability to design and automate your work and effectiveness
  • Highly collaborative and can effectively give and receive transparent feedback
  • Excellent written and spoken communication skills and have the ability to translate highly technical subjects in layman’s terms
  • A keen sense of curiosity and ability to find unconventional solutions to difficult problems

What would give you an edge?

  • A programming background
  • Experience or a keen interest in cybersecurity

What's in it for you?

  • Rapidly growing user base: Work directly with some of the world’s largest, fastest growing, and most innovative companies
  • Interesting problems, at scale: Deeply explore the ever-evolving world of cybersecurity, with a platform processing billions of data points daily
  • Learn from industry-leading experts: Our security research has been featured in The New York TimesThe New YorkerThe Washington PostTechCrunchBloombergGizmodoEngadgetForbesZDNet, and The Guardian
  • Impact: See the impact of your work on a daily basis, with data and impact available on dashboards you have access to
  • Generous compensation: Extremely competitive base salary and equity 
  • Great perks: Free lunch, flexible work arrangements, and gym reimbursement
Before starting work with us, you will need to undertake a national police history check and reference checks. Also please note that at this time, we cannot support candidates requiring visa sponsorship or re-location. Apologies.

Tags: Cloud Monitoring OSINT Threat intelligence

Perks/benefits: Career development Competitive pay Equity Lunch / meals

Region: Asia/Pacific
Country: Australia
Job stats:  17  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.