Threat Intelligence Analyst
Sydney
UpGuard, Inc.
Third-party risk and attack surface management software. UpGuard is the best platform for securing your organization’s sensitive data. Our security ratings engine monitors millions of companies and billions of data points every day.
Who are we?
UpGuard’s mission is to protect the world’s data. We obsessively seek out elegant, robust ways to enable our customers to find, acknowledge, and remediate cyber risk. With UpGuard, organizations leverage our security expertise and software to automate what were once laborious, spreadsheet-driven processes–whether it's monitoring the attack surface of hundreds of vendors or assessing the security of their own infrastructure. UpGuard is used by some of the world’s largest, fastest growing and most innovative companies.
Why are we hiring this role?
UpGuard provides a Data Leaks service to our customers and with our current growth, are looking for someone to come on board and own the data leaks program for enterprise customers. You will be responsible for using our proprietary leak detection engine to detect and investigate customers' potential leaks of credentials, personal information, and business secrets.
As part of our team, you'll work with other researchers to improve our leak detection methodologies, and interact with customers to understand their risks and guide leak remediation. You are as comfortable investigating large data collections on a computer as you are in front of stakeholders.
UpGuard’s mission is to protect the world’s data. We obsessively seek out elegant, robust ways to enable our customers to find, acknowledge, and remediate cyber risk. With UpGuard, organizations leverage our security expertise and software to automate what were once laborious, spreadsheet-driven processes–whether it's monitoring the attack surface of hundreds of vendors or assessing the security of their own infrastructure. UpGuard is used by some of the world’s largest, fastest growing and most innovative companies.
Why are we hiring this role?
UpGuard provides a Data Leaks service to our customers and with our current growth, are looking for someone to come on board and own the data leaks program for enterprise customers. You will be responsible for using our proprietary leak detection engine to detect and investigate customers' potential leaks of credentials, personal information, and business secrets.
As part of our team, you'll work with other researchers to improve our leak detection methodologies, and interact with customers to understand their risks and guide leak remediation. You are as comfortable investigating large data collections on a computer as you are in front of stakeholders.
What will you accomplish?
- Research and evaluate new vectors which may lead to unnecessary data exposure
- Develop, create systems and utilise in-house tools to discover, analyse and evaluate potential external exposures of customers/prospects
- Research, evaluate, review inefficiencies and report on potential exposures for customers, prospects and partnered organisations
- Work with customers and prospective customers to determine their required solutions and scope
- Identify, investigate and analyse prospects and customers business processes, procedures and work practices to determine risks
- Identify and evaluate inefficiencies in customer vendor/security management process/practises/system functionality
- Formulate product requirements based on user feedback
- Create user and training documentation for customers and conduct user groups/training when required
- Lend expertise, advice and recommendations to media and governmental organisations on the subject of data exposure and breaches
- Manage and organise large amounts of data gathered from multiple sources and analyse it for risks posed to our customers
What do we need from you?
- Strong understanding of concepts in information security and knowledge of issues in cloud computer security
- Familiarity with methods for reconnaissance using OSINT
- Experience identifying and analyzing data exposures with an awareness of rules for responsible disclosure
- Understand how to discover, identify, and attribute sensitive data in public code repositories, cloud storage containers, exposed databases and misconfigured websites
- Keen ability to design and automate your work and effectiveness
- Highly collaborative and can effectively give and receive transparent feedback
- Excellent written and spoken communication skills and have the ability to translate highly technical subjects in layman’s terms
- A keen sense of curiosity and ability to find unconventional solutions to difficult problems
What would give you an edge?
- A programming background
- Experience or a keen interest in cybersecurity
What's in it for you?
- Rapidly growing user base: Work directly with some of the world’s largest, fastest growing, and most innovative companies
- Interesting problems, at scale: Deeply explore the ever-evolving world of cybersecurity, with a platform processing billions of data points daily
- Learn from industry-leading experts: Our security research has been featured in The New York Times, The New Yorker, The Washington Post, TechCrunch, Bloomberg, Gizmodo, Engadget, Forbes, ZDNet, and The Guardian
- Impact: See the impact of your work on a daily basis, with data and impact available on dashboards you have access to
- Generous compensation: Extremely competitive base salary and equity
- Great perks: Free lunch, flexible work arrangements, and gym reimbursement
Tags: Cloud Monitoring OSINT Threat intelligence
Perks/benefits: Career development Competitive pay Equity Lunch / meals
Region:
Asia/Pacific
Country:
Australia
Job stats:
17
1
0
Categories:
Analyst Jobs
Threat Intel Jobs
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Product Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cyber Security Specialist jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Sr. Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs
- Open Kubernetes-related jobs