See available positions
in

TON ecosystem

teams

See available
positions in

TON
ecosystem

projects

SOC Threat Intelligence Analyst

Wallet

Wallet

Other Engineering · Full-time
Remote
Posted on Thursday, August 29, 2024

Wallet in Telegram is your gateway to the world of digital currencies, specially tailored for individuals in emerging markets. We understand the complexities and intimidation often associated with existing crypto solutions, which is why we've designed the Wallet to be the ultimate user-friendly platform for managing finances. No need to open a traditional bank account or wrestle with convoluted crypto exchanges and wallets.

Leveraging the power of advanced blockchain technology, Wallet delivers a seamless onboarding experience into the crypto ecosystem. It enables users to effortlessly store, send, and receive digital currencies, all via the familiar interface of Telegram. Managing your finances becomes as simple as sending a message.

At Wallet, we're committed to using technology to disrupt traditional banking systems, providing our customers with more flexible and inclusive financial services. Whether you're a crypto novice or seeking to simplify your digital finance experience, Wallet is crafted with your needs in mind.

We are looking for a SOC Threat Intelligence Analyst to join our Security Operations Center team. This role involves monitoring, analyzing, and responding to emerging security threats, with a focus on gathering, analyzing, and disseminating threat intelligence to strengthen our organization's security posture. The ideal candidate will be proficient in threat intelligence strategies, conducting in-depth security threat analyses, and collaborating with teams to proactively mitigate risks.

Responsibilities:

  • Continuously monitor and analyze security alerts and logs through our Security Information and Event Management (SIEM) platform, endpoint monitoring solutions, and other security tools to identify potential security incidents.
  • Develop and fine-tune SIEM rules and alerts to enhance threat detection capabilities.
  • Collect, analyze, and disseminate threat intelligence from various internal and external sources to anticipate and prevent security incidents.
  • Perform detailed analysis of complex security threats, including malware, phishing, and advanced persistent threats (APTs), to determine root causes and potential impacts.
  • Prepare and present threat intelligence reports to stakeholders and senior management, providing actionable insights to guide decision-making.
  • Collaborate with other security team members to prioritize and address long-term security issues.
  • Develop and implement automated reporting capabilities to keep teams informed of security issues and impacts in real-time.
  • Conduct regular security audits and compliance checks to ensure alignment with industry standards and regulatory requirements.
  • Coordinate response activities for confirmed incidents, recommending and implementing remedial actions.
  • Stay up-to-date on the latest security trends, emerging threats, and best practices in threat intelligence analysis.

Requirements:

  • 3+ years of experience in a threat intelligence analyst role or a similar position within a Security Operations Center (SOC).
  • 2+ years of hands-on experience with security tools such as SIEM, IPS/IDS, XDR, and endpoint protection solutions.
  • Extensive knowledge of threat intelligence methodologies, including the collection, analysis, and dissemination of actionable intelligence.
  • Strong understanding of networks and operating systems (Windows, Linux, or Mac OS X) to effectively analyze and respond to security threats.
  • Experience with Security Orchestration, Automation, and Response (SOAR) tools and principles.
  • Strong understanding of cloud security principles and best practices, with at least 1 year of experience working with Cloud Service Providers (AWS, GCP, Azure).
  • Basic knowledge of modern programming languages such as Go, Rust, Python, or C++, with the ability to read and analyze code efficiently (experience with personal or open-source projects is a plus).
  • Demonstrated analytical and problem-solving skills, with a focus on threat analysis and incident response.
  • Effective communication and documentation skills, capable of presenting complex threat intelligence to both technical and non-technical stakeholders.
  • Ability to manage multiple tasks and prioritize effectively in a fast-paced environment.
  • English proficiency at B2+ Level or higher.

Why it is a fantastic opportunity:

  • Our business is growing at an exponential scale.
  • Work in a well-funded startup environment with unique growth opportunities and a chance to join a rapidly growing company with a unique product.
  • Be based remotely.
  • Participation in the performance review and bonus programme.
  • Compensation for medical expenses.
  • Provision of necessary equipment.
  • Annual vacation of 20 working days plus 10 paid days off.
  • 14 days of paid sick leave to support your health and recovery when needed.
  • Access to internal English courses for continuous learning and improvement in language skills.
Wallet is an equal opportunity employer.

Apply for this job

Drag and drop or click to upload.
Tell us why you are a good fit, add a cover letter or anything else you want to share.
To withdraw or update your application, email applications@getro.com