Threat Intelligence Security Engineer - Location Flexible

Austin, TX; Remote - US

Applications have closed

Dropbox

Dropbox helps you simplify your workflow. So you can spend more time in your flow.

View company page

Role Description

Dropbox is seeking a Security Engineer to join our Threat Intelligence and Hunting team. You will investigate critical threats to Dropbox and our customers, profiling threat actors and uncovering the actions, techniques and objectives of these malicious actors.    With your expertise, you will work to ensure the security of Dropbox and our customers. Aiming to protect both those who use our platform, and those who engage with it through their friends, family and colleagues. We want to ensure trust in the Dropbox platform by protecting all users interactions with our products.    In this role, you will analyze telemetry data to identify signals indicative of fraud and abuse. You will help enhance our capabilities by formulating new analytic techniques and working across teams to drive the supporting capabilities. We seek candidates with a deep understanding of current cybercrime and fraud actor TTPs and experience performing question-driven analysis. You will have a solid understanding of API, network and host based indicators and how to best leverage them. You are able to script and help automate recurring tasks to improve the overall effectiveness of the team. An understanding of operating systems internals will be an asset.

Responsibilities

  • Hunt for and investigate malicious activity across all Dropbox environments
  • Perform deep dive analysis of potentially malicious artifacts
  • Pursue actionable intelligence on cybercrime threats as they relate to Dropbox
  • Document and communicate investigations into threat actors, their activity, TTPs, briefing internal customers and partnering to detect, disrupt and mitigate attackers 
  • Translate actor TTPs into actionable data points to reduce overall fraud and abuse activity in Dropbox
  • Analyze large structured and unstructured data sets to identify trends and anomalies indicative of malicious activities
  • Create security techniques and automation for internal use that enable the team to operate at high speed and broad scale
  • Serve as subject matter expert on threat actors focused on Dropbox and our customers

Requirements

  • 5 years of combined experience in either incident response, threat intelligence or threat hunting 
  • Experience in cybercrime investigations, tracking threat actor behaviors, including investigating, researching, or analyzing TTPs (Tactics, Techniques and Procedures), or attribution research 
  • Strong demonstrated knowledge of common offensive techniques, and an in-depth knowledge of UNIX tools and architecture 
  • Experience monitoring and analyzing deep/dark web forums 
  • Experience with malware, network flow and large-scale data analysis
  • Experience with threat modeling or other risk identification techniques
  • Experience in areas such as system security and/or network security
  • Experience with security vulnerabilities, exploitation techniques, and methods for remediation 
  • Experience analyzing logs, building detections and coordinating remediation 
  • Scripting/Coding skills (e.g. Python, PowerShell, other common languages)

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: APIs Automation Cyber crime Incident response Malware Monitoring Network security PowerShell Python Scripting Threat intelligence TTPs UNIX Vulnerabilities

Perks/benefits: Team events

Regions: Remote/Anywhere North America
Country: United States
Job stats:  41  5  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.