Threat Operations Analyst

Cordoba, Argentina


Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.

View company page

It's fun to work in a company where people truly BELIEVE in what they're doing!

We're committed to bringing passion and customer focus to the business.

It's fun to work in a company where people truly BELIEVE in what they're doing!

We're committed to bringing passion and customer focus to the business.


The Role

We are looking for a highly intelligent, driven person to join a dynamic group of people who are passionate about saving the world from the growing threat of e-mail borne threats: phishing, malware , BEC and spam. We are competing against a very active, creative, and motivated adversary who was credited as sending over 40 trillion spam messages last year alone! If you are interested in helping us achieve our goal and rid the world of phishing, malware and spam, we definitely would like to speak with you. We offer a challenging environment that fosters creativity and rewards excellence.

Your day to day

  • Member of a creative, enthusiastic, and geographically distributed team (in a 24/7/365 "follow the sun" model) that is responsible for identifying, parameterizing, and responding quickly to spam attacks levied against some of the world's largest organizations.

  • Analyze email messages reported by customers as well as work on large data sets in order to determine correct classification (spam, phishing, malware, BEC (Advanced Email Fraud), bulk, ham).

  • Perform deep analyses of spam message headers & structures to identify novel spam features, and design various rules/signatures (some might be regular-expression (regex) based ) to detect those features and block email borne threats

  • Excellent written and verbal communication skills with the ability to present and explain your findings to the customers in writing using a ticketing system

  • Be available in a rotating on-call basis to respond to develop signatures, that detect and block an emerging or an ongoing threat(s) reported by customers

  • Provide responses and explanations to customers in a positive, professional manner if needed

  • Help us define the landscape, prevalence, and evolution of messaging abuse, threats, and attacks by participating in future requirements definition discussions of our products.

What you bring to the team

  • Knowledge of different types of email borne attack vectors, tools, tactics and technical data.

  • In-depth knowledge of email borne threats: phishing, malware, spam. Ability to find and research suspicious patterns in URLs, domains, in conjunction with overall email structure (email headers and email context) or any relevant Cybersecurity experience

  • General familiarity with how mail delivery works, knowledge of email security standards and protocols, such as SPF, DKIM, and DMARC, would be beneficial.

  • Experience with data analysis, familiarity with cybersecurity best practices

  • Familiarity with Unix environments and comfort with a range of Unix command line tools

  • for manipulating and extracting content from text files is a must have

  • Hands-on experience with Regular Expressions

  • Familiarity and/or experience with LUA based detection signatures is a plus

  • Familiarity and/or experience with ClamAV based detection signatures is a plus

  • Ability to create signature rules based on observed suspicious patterns  with experience of 3-4 or more years in the field.                                                                   .        

  • Hands-on experience with Python or a different programming language is a plus       

  • General curiosity about the headers and structure of email messages

  • Willingness to play an important technical role

  • Demonstrated analytical and creative problem-solving abilities.          

  • Ability to work independently yet fully integrate with worldwide, remote teams.            

  • Can-do attitude with a focus on problem solving, product quality, and a strong desire to get the job done.              

  • Requirements/Education and/or Equivalent Experience (including technical and non-technical capabilities)            

  • BSCS or equivalent, or equivalent technical experience.   


If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Lua Malware Python UNIX

Regions: Remote/Anywhere South America
Country: Argentina
Job stats:  15  2  0

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.