Sugerencias de búsqueda:

sin experiencia
limpieza
dependienta
conductor camion
auxiliar enfermería
profesor
psicólogo
dependienta de tienda
auxiliar administrativo
supermercado
ingeniero
recepcionista
administrativo
Vallés Occidental
Madrid
Bajo Llobregat
Comunidad de Madrid
Andalucía
Cataluña
Costa del Sol Occidental
Alcalá de Henares
Comunidad Valenciana
Cuadrilla de Vitoria
Navarra
Remote

Threat Detection Analyst

OPSWAT
Madrid, Comunidad de Madrid
Tiempo completo
hace 1 día

OPSWAT, a global leader in IT, OT, and ICS critical infrastructure cybersecurity, delivers an end-to-end platform that gives public and private sector organizations and enterprises the critical advantage needed to protect their complex networks, secure their devices, and ensure compliance. Over the last 20 years our commitment to innovative technology has earned the trust of more than 1,700 organizations, governments, and institutions globally, solidifying our role in protecting the world’s critical infrastructure and securing our way of life.

 

The Position

The Threat Intelligence Analyst is responsible for collecting, analyzing, and disseminating threat intelligence derived from Indicators of Compromise (IOCs) generated by an existing sandbox product and external sources. This role focuses on processing sandbox outputs to produce actionable intelligence, identifying emerging cyber threats, and supporting organizational security strategies.

The ideal candidate will excel in leveraging sandbox-generated data, correlating it with external intelligence sources, and communicating findings to enhance the organization’s threat awareness.

 

What You Will Be Doing

o Collect and analyze IOCs (e.g., malicious IPs, domains, file hashes, and behavioral patterns) from the organization’s sandbox product to develop actionable threat intelligence.

o Correlate sandbox outputs with open-source and commercial threat intelligence feeds to enrich findings and validate threats.

o Produce detailed threat intelligence reports, including insights on threat actors, tactics, techniques, and procedures (TTPs).

o Monitor sandbox-generated data to identify emerging threats, campaigns, and trends in the cyber threat landscape.

o Track threat actor behavior and malware campaigns using IOCs to provide proactive intelligence for organizational defense.

o Maintain and update threat intelligence profiles to reflect evolving threats and adversary methodologies.

o Prepare and deliver concise briefings, reports, and dashboards summarizing sandbox-derived intelligence for technical and non-technical stakeholders.

o Collaborate with cybersecurity teams to share actionable intelligence and support strategic decision-making.

o Contribute to threat intelligence-sharing initiatives with industry partners, ISACs, or platforms like MISP.

o Leverage sandbox outputs to extract meaningful IOCs and contextualize them within the broader threat landscape.

o Recommend improvements to sandbox data collection processes to enhance the quality and relevance of IOCs.

o Stay informed on sandboxing technologies to maximize the value of generated intelligence.

o Stay updated on the latest cyber threats, malware trends, and threat intelligence methodologies.

o Participate in training and knowledge-sharing to enhance team capabilities in threat intelligence.

o Monitor threat intelligence platforms and sources to ensure timely and relevant updates to organizational defenses.

 

What We Need From You 

o Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or a related field, or equivalent work experience.

o Relevant certifications (e.g., GCTI, CTIA, or equivalent) are preferred.

o 2+ years of experience in threat intelligence or related cybersecurity roles.

o Hands-on experience processing IOCs from sandbox environments (e.g., Cuckoo Sandbox, CrowdStrike Falcon Sandbox, Hatching Triage, or similar).

o Familiarity with threat intelligence platforms (e.g., ThreatConnect, MISP, or Recorded Future).

o Strong understanding of cyber threats, including malware, phishing, and advanced persistent threats (APTs).

o Proficiency in analyzing IOCs such as file hashes, IP addresses, domains, and behavioral indicators.

o Knowledge of the MITRE ATT&CK framework and TTPs for threat contextualization.

o Experience with scripting languages (e.g., Python) for automating IOC processing or intelligence workflows is a plus.

o Excellent written and verbal communication skills for delivering clear and actionable intelligence.

o Ability to work collaboratively in a fast-paced, team-oriented environment.

 

It Would Be Nice If You Had

 

 

OPSWAT is an equal opportunity employer. We celebrate diversity and are committed to providing an environment where equal employment opportunities are extended to all employees and applicants, free of discrimination and harassment of any type. All employment decisions are based on individual qualifications, job requirements, and business needs without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other category protected by federal, state, or local laws.

Recruiting Agencies: we do not accept unsolicited resumes from third party agencies for any of our open positions. To submit resumes for our jobs, there must be a recruiting contract approved by our legal team and endorsed by both parties. We are currently not accepting additional 3rd party agencies at this time.

 

Guardar Postular
Reportar empleo
Otras recomendaciones de empleo:

Cyber Threat Hunting - Lead Associate

WTW
Madrid, Comunidad de Madrid
  • Conduct threat-hunting operations to identify and mitigate...
  • Develop and execute hypothesis-driven threat hunting...
hace 2 semanas

Sr. Threat Research Engineer

Netskope
Madrid, Comunidad de Madrid
  • Threat Hunting: Use our data platform and advanced analysis...
  • Intelligence Sharing & Collaboration: Actively...
hace 1 semana

Software Engineer II, Google Threat

Google
Andalucía
Google's software engineers develop the next-generation technologies that change how billions of users connect, explore, and...
hace 2 días

Cyber Detection Engineer

Boehringer Ingelheim
Cataluña
This role will work in the Security Automation team, working closely with Detection Engineering, Threat Intelligence, and Security...
hace 1 semana

Product Analyst Intern, Tommy Hilfiger - Madrid

All We Wear Group
Madrid, Comunidad de Madrid
  • Update and analyse Sales & KPIS reporting
  • Tracking deliveries to stores. In transit and receiving.
  • Solve merchandise incidents...
hace 1 semana

Fraud Analyst (Pre-Pay)

The Cigna Group
Comunidad de Madrid
  • Provides initial review and research to help determine if...
  • Partner with cost containment teams in other geographies to...
hace 2 días

Credit Analyst - Structured Finance - Analyst / Senior Analyst level - Madrid

Fitch Ratings
Madrid, Comunidad de Madrid
  • The successful candidate will be part of a team of analysts...
  • The team analyses transactions in line with Fitch’s rating...
hace 1 semana

MLOps Analyst - SCIB Málaga

Santander
Andalucía
  • Implement AI models using Python.
  • Build and maintain APIs related to AI/ML.
  • Use Git and implement CI/CD pipelines using tools like...
hace 2 semanas