Application window has been extended and is expected to close by 03/31/2025. However, the job posting may be removed earlier if the position is filled or if a sufficient number of applications are received.
Your Impact- Write analytical reports and blogs on diverse topics for a variety of different audiences.
- Act as principal investigator for internal and external research projects.
- Query, enrich, and analyze data from Cisco telemetry and open-source repositories to identify anomalous or potentially malicious activity
- Hunt malware, tools, and threat actors across various data sets.
- Track and document threat actor tactics, techniques, and procedures (TTPs) based on open-source research, Talos findings, and incident response engagements.
- Author long-form research papers on various threat actors/tools/malware.
- Source and analyze data from available product sources across Cisco as well as externally from partners or other qualified third-parties.
- Manage dissemination of security intelligence and research efforts across the organization.
- Monitor strategic trends in the cyber threat landscape, including threat actor behavior and the emergence of new adversaries and threats.
- Provide quick turnaround analysis for internal business intelligence and external communications with customers/stakeholders.
- Establish cross-departmental channels to facilitate collaborative research and analysis.
- Provide analytical editing for Talos intelligence products.
Minimum Qualifications- 2+ years’ experience researching, writing, editing, and presenting threat intelligence investigations for a variety of audiences.
- 3+ years’ experience in a security research, threat intelligence, or intelligence analysis role with a Bachelor’s degree or equivalent years of experience
- 2+ years’ experience threat hunting or tracking malware, tools, or threat actors across various data sets.
- 2+ years’ experience with threat analysis platforms, such as Synapse, ThreatConnect, Maltego, etc.
Preferred Qualifications- Excellent soft skills, including collaborating with remote teams, communicating findings via briefings and written products, and accepting and providing critiques/feedback.
- In-depth understanding and knowledge of the security landscape
- Proficiency in scripting languages (e.g. Python, Ruby, Perl)
- Experience with data intelligence platforms i.e. DataBricks
- Background in geopolitics
- Fluency in a language other than English
- Postgraduate degree
- Quick analytical skills, with the ability to conduct fast-paced research
- Ability to solve complex problems independently
- Ability to track and manage numerous parallel activities
- Facility for learning mastering new technologies, skills, and areas of research