Threat Hunter - Security Operations Expert
Red Cell PartnersFull Time
Senior (5 to 8 years)
Candidates should possess a BA/BS or equivalent experience in Computer Science, Computer Engineering, Information Security, Security Studies, Intelligence, or a related field, with a preference for 5+ years of experience in Information Security and/or Threat Intelligence. Demonstrated experience in technical threat analysis, in-depth knowledge of TCP/IP and networking protocols, and capability in identifying and tracking infrastructure through banner analysis and metadata correlation are required. Experience with static and dynamic malware analysis, proficiency in scripting languages like Python, and familiarity with CTI research tools such as Maltego, Jupyter Notebook, and the Elastic Stack are also necessary. Proven experience applying structured analytical techniques, intelligence methodologies, and threat modeling frameworks like MITRE ATT&CK is expected, along with a detailed understanding of APT groups' activities, TTPs, motivations, and targeting patterns, and experience with open-source intelligence-gathering tools.
The Senior Threat Intelligence Analyst will lead efforts to track state-sponsored APT campaigns, focusing on actors operating beyond the traditional "Big Four" and emphasizing regions such as Asia, Europe, the Middle East, and emerging areas of strategic interest. Responsibilities include conducting proactive research, synthesizing technical datasets for novel insights and reporting, and establishing methods to track APT campaigns using network, intrusion, and malware analysis. The role involves hunting for threat actor infrastructure and activity, identifying and prioritizing detection mechanisms for command-and-control infrastructure, malware families, and threat groups, and continuously evaluating and improving threat intelligence workflows for automation and efficiency. Additionally, the analyst will mentor colleagues, collaborate with geopolitical and regional analysis teams, propose and evaluate new data sources and analytical methods, represent Insikt Group externally through customer briefings and media engagements, collaborate with engineering and data science teams for platform integration, and support customer intelligence needs through the Analyst-on-Demand service.
Provides machine-readable threat intelligence solutions
Recorded Future provides threat intelligence in the cybersecurity industry by gathering and analyzing information about potential threats to organizations. Their intelligence is delivered in a machine-readable format, making it easy for clients like threat analysts and security teams to integrate with their existing systems. Unlike competitors, Recorded Future focuses on partnerships with Value Added Resellers (VARs) to enhance their offerings and provide comprehensive support. The company's goal is to help organizations lower the risk of cyber attacks through effective threat intelligence.