Threat Operations Analyst
Cordoba, Argentina
Proofpoint
Proofpoint helps protect people, data and brands against cyber attacks. Offering compliance and cybersecurity solutions for email, web, cloud, and more.It's fun to work in a company where people truly BELIEVE in what they're doing!
We're committed to bringing passion and customer focus to the business.
It's fun to work in a company where people truly BELIEVE in what they're doing!
We're committed to bringing passion and customer focus to the business.
POSITION IS FULLY REMOTE ANYWHERE IN ARGENTINA
The Role
We are looking for a highly intelligent, driven person to join a dynamic group of people who are passionate about saving the world from the growing threat of e-mail borne threats: phishing, malware , BEC and spam. We are competing against a very active, creative, and motivated adversary who was credited as sending over 40 trillion spam messages last year alone! If you are interested in helping us achieve our goal and rid the world of phishing, malware and spam, we definitely would like to speak with you. We offer a challenging environment that fosters creativity and rewards excellence.
Your day to day
Member of a creative, enthusiastic, and geographically distributed team (in a 24/7/365 "follow the sun" model) that is responsible for identifying, parameterizing, and responding quickly to spam attacks levied against some of the world's largest organizations.
Analyze email messages reported by customers as well as work on large data sets in order to determine correct classification (spam, phishing, malware, BEC (Advanced Email Fraud), bulk, ham).
Perform deep analyses of spam message headers & structures to identify novel spam features, and design various rules/signatures (some might be regular-expression (regex) based ) to detect those features and block email borne threats
Excellent written and verbal communication skills with the ability to present and explain your findings to the customers in writing using a ticketing system
Be available in a rotating on-call basis to respond to develop signatures, that detect and block an emerging or an ongoing threat(s) reported by customers
Provide responses and explanations to customers in a positive, professional manner if needed
Help us define the landscape, prevalence, and evolution of messaging abuse, threats, and attacks by participating in future requirements definition discussions of our products.
What you bring to the team
Knowledge of different types of email borne attack vectors, tools, tactics and technical data.
In-depth knowledge of email borne threats: phishing, malware, spam. Ability to find and research suspicious patterns in URLs, domains, in conjunction with overall email structure (email headers and email context) or any relevant Cybersecurity experience
General familiarity with how mail delivery works, knowledge of email security standards and protocols, such as SPF, DKIM, and DMARC, would be beneficial.
Experience with data analysis, familiarity with cybersecurity best practices
Familiarity with Unix environments and comfort with a range of Unix command line tools
for manipulating and extracting content from text files is a must have
Hands-on experience with Regular Expressions
Familiarity and/or experience with LUA based detection signatures is a plus
Familiarity and/or experience with ClamAV based detection signatures is a plus
Ability to create signature rules based on observed suspicious patterns with experience of 3-4 or more years in the field. .
Hands-on experience with Python or a different programming language is a plus
General curiosity about the headers and structure of email messages
Willingness to play an important technical role
Demonstrated analytical and creative problem-solving abilities.
Ability to work independently yet fully integrate with worldwide, remote teams.
Can-do attitude with a focus on problem solving, product quality, and a strong desire to get the job done.
Requirements/Education and/or Equivalent Experience (including technical and non-technical capabilities)
BSCS or equivalent, or equivalent technical experience.
#LI-AB1
If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us!
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open SOC Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Senior Information Security Analyst jobs
- Open Senior Information Security Engineer jobs
- Open Analyste CERT / Incident Responder junior (H/F) jobs
- Open Ingénieur DevSecops H/F jobs
- Open Chief Information Security Officer jobs
- Open Analyste CERT / Incident Responder senior (H/F) jobs
- Open Staff Security Engineer jobs
- Open Information Security Officer jobs
- Open Cybersecurity Consultant jobs
- Open Security Operations Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Security Architect jobs
- Open o365 Security Architect jobs
- Open Electronic Warfare Advanced Tactical Trainer jobs
- Open Senior Cyber Security Engineer jobs
- Open Staff Product Security Engineer jobs
- Open Senior Security Analyst jobs
- Open Principal Security Engineer jobs
- Open Product Security Engineer jobs
- Open Senior SOC Analyst jobs
- Open Cyber Security Architect jobs
- Open GCP-related jobs
- Open SOC-related jobs
- Open Risk assessment-related jobs
- Open Governance-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open CISM-related jobs
- Open ISO 27001-related jobs
- Open Analytics-related jobs
- Open SaaS-related jobs
- Open Threat intelligence-related jobs
- Open IAM-related jobs
- Open Malware-related jobs
- Open Java-related jobs
- Open CISA-related jobs
- Open Security Clearance-related jobs
- Open Vulnerability management-related jobs
- Open Kubernetes-related jobs
- Open DevOps-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Forensics-related jobs
- Open SQL-related jobs
- Open CI/CD-related jobs
- Open Splunk-related jobs