Threat Intelligence Security Analyst
Remote (Europe), Vilnius, Barcelona, London, Prague, Geneva, Zurich;, Switzerland
Applications have closed
Proton AG
Over 100 million people use Proton to stay private and secure online. Get a free Proton account and take back your privacy.Our company
At Proton, we envision an internet where privacy is the default, and we’re building ways to help all people secure their digital lives and take control of their data.ProtonMail was founded in 2014 by a group of scientists who met at the European Organization for Nuclear Research (CERN). And since its inception, the company has grown at a fast pace and today has over 40 million users.
Our principal product, ProtonMail, is the world’s largest secure email service. Our second product, ProtonVPN, is one of the world’s most popular VPN services. Our vision is to build an internet platform for the protection of digital rights, and we are also developing additional products, including ProtonCalendar, ProtonDrive, and more to come.Proton users include leaders of the Hong Kong protest movement, New York Times journalists, some of the world’s largest corporations, and millions of ordinary citizens from over 180 countries. Our team is diverse and dynamic, representing over 30 different nationalities, with offices in Geneva, Zurich, Prague, Vilnius, Skopje, and Taipei.
About the position
We are looking for an experienced threat intelligence security analyst. You will be responsible with building up the threat intelligence capability within Proton, providing tracking and analyses of emerging cyber threats that the company may be subject to. This will require developing, implementing and maintaining a threat intelligence strategy and approach. This position can either be in one of our offices or remote within a reasonable time zone distance from Switzerland. We encourage diversity and appreciate top engineering and social skills.
What you will do:
- Provide significant input into developing and maintaining a threat intelligence program that will assist in decision making and actions based on identified and/or potential risks
- Stay up to date with new emerging threats, trends or tools that might be used in malicious way against the company and provides written and verbal briefing to the team
- Participate in liaison with appropriate external and 3rd party orgs in the infosec community, such as FIRST, to gather and correlate security intelligence
- Manage TI feeds from different sources
- Analyse results of intelligence activities, cross-reference and correlate information from various sources and systems to develop actionable intelligence
- Provide technical input to the team in relation to cyber threat intelligence to ensure the development and maintenance of a proactive, forward-thinking approach to threats
- Work closely with the team in order to maintain and enhance our security monitoring toolkit (SIEM, sensors, etc.)
- Create, improve, and implement security detection techniques within our SIEM
- Help us prioritize and create meaningful alerts from events
- Work as part of a team to handle and respond to security alerts
- Identify malicious activities within our network, which our current toolset might not cover
Requirements
- Minimum 3 years working in a similar cyber security role with an emphasis on threat intelligence
- Strong understanding of the current threat landscape, its actors and methods of identifying tactics, techniques and procedures
- Good experience with TI platforms, preferably open source
- Good knowledge of the MITRE attack framework
- Strong understanding of common malware techniques
- Good knowledge of Linux based operating systems and their security related components (overall architecture, system calls, SElinux)
- Good knowledge of system/network security and security best practices (network ACLs, authentication mechanisms, OS hardening)
- Good understanding of networking and endpoint protection technologies as well as related threat detection technologies (WAF, EDR, IDS/IPS)
- Strong analytical and creative problem-solving skills
- Advanced Python (or similar) coding skills
- Strong communication skills (must be fluent in English)
- Ability to work independently and in a group environment
- Thinking out of the box
Knowledge in the following areas is considered a plus:
- Experience using Misp
- Experience using the Elastic stack
- Experience using Jupyter and Pandas
- Know how to use modern Data analysis and possibly ML techniques
- Experience in Docker and Kubernetes environments
- Experience in Cloud security
- Experience in other security disciplines
- An industry qualification from a recognized training provider is an asset
Why you should join Proton:
- We work on interesting, challenging problems every day. There is never a dull moment.
- Our startup culture means everyone’s opinion matters. You can have a significant impact.
- Our rapid growth means there are many opportunities for advancement.
- The chance to do something meaningful. Proton products protect dissidents, journalists, and activists. Our work saves lives.
- Be part of something bigger. Millions of people and businesses around the world have embraced our idea of an Internet where privacy and security are the default. Join the privacy revolution that is changing the world.
ProtonMail is using Recruitee recruitment platform for more effective hiring and better candidate experience. Your data will be kept confidential and not shared with any third parties.
Keep in mind that you will receive emails from careers@protonmail.recruitee.com email or other addresses on the protonmail.recruitee.com domain.
Tags: Cloud Docker EDR IDS IPS Kubernetes Linux Malware MISP Monitoring Network security Nuclear Open Source Privacy Python SIEM Strategy Threat detection Threat intelligence VPN
Perks/benefits: Startup environment Team events
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Product Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs
- Open Kubernetes-related jobs