Sr. Threat Intel Analyst
Mexico, D.F., Mexico
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
JOB DESCRIPTION
Calling all originals: At Levi Strauss & Co., you can be yourself — and be part of something bigger. We’re a company of people who like to forge our own path and leave the world better than we found it. Who believe that what makes us different makes us stronger. So add your voice. Make an impact. Find your fit — and your future.
Summary of the role:
The Sr. Threat Intel Analyst plays an integral role in the protection of the brand and works directly with the Director of Threat Engineering and the broader Global Information Security (GIS) team. This role focuses on designing, building, and maintaining tools and systems that collect, process, and analyze threat intelligence data. The priorities and directives are consistent with the vision of the CISO across Levi Strauss & Company globally.
The Sr. Threat Intel Analyst will take a lead role in safeguarding LS&Co.’s information and technology assets, critical suppliers, and consumers against the evolving threat landscape, allowing LS&Co. to make threat informed cybersecurity decisions to strengthen LS&Co.’s cybersecurity posture.
This position will lead LS&Co’s threat intelligence environment and is responsible for collaborating with various groups including the Security Operation Center, Vulnerability Management team, Red Team and Detection Engineering team to track threat actors, enrich threat data, and develop proactive defenses. The ideal candidate will have a strong background in software engineering, scripting, and automation to enhance intelligence collection and dissemination.
About the role:
- Conduct active intelligence gathering through OSINT, dark web monitoring, and commercial CTI sources
- Develop and automate intelligence collection and analysis using Python, PowerShell, or other scripting languages.
- Analyze security events and alerts from various sources (SIEM, EDR, cloud logs) to identify and address vulnerabilities or attacks.
- Monitor threat actor activity, vulnerabilities, and tactics, techniques, and procedures (TTPs).
- Hunt for attackers and thoroughly document code, findings, and processes.
- Collaborate with detection engineers to create detection rules based on intelligence findings.
- Stay up to date with emerging threats, cybercrime trends, and nation-state activities.
- Plan and maintain a roadmap for the future of intel program, negotiated and prioritized with leadership.
About you:
- Bachelor's or Master's degree in computer science, information systems, cyber security or a related field; or equivalent professional experience.
- CISSP or equivalent certifications and experience a plus.
- Experience in cyber threat intelligence, threat hunting, or security operations a plus.
- Expertise in Python, PowerShell, or Bash for automation and intelligence processing.
- Understanding of MITRE ATT&CK, kill chain model, and threat actor TTPs a plus.
- Experience with OSINT tools, passive DNS, WHOIS, and dark web monitoring a plus.
- Strong analytical, problem-solving, and technical writing skills.
- 3+ years experience in designing application to build queries, alerts, and actions for cloud and on-prem environments
- Experience in day-to-day operational processes such as security monitoring, data correlation, troubleshooting, security operations, digital forensics, and incident response.
- Experience with the use and protection of major cloud platforms such as Azure, AWS, and GCP.
- Knowledge of attacker tools and evasion techniques.
- Ability to drive performance and develop teams - recruit diverse talent, run disciplined performance reviews, and regularly collaborate and check-in on priorities to help focus on key results.
- Knowledge of performance metrics, reporting, and risk management
- A strong moral compass, high integrity, and accountability are vital to be a successful in this role
Benefits
We put a lot of thought into our programs to provide you with a benefits package that matters. Whether it is for medical care, taking time off, improving your health or planning for retirement, we've got you covered.
Here's a small snapshot:
Complimentary preventive health check-up for you & your spouse
OPD coverage
Best in class leave plan including paternity & family care leaves
Counselling sessions to prioritizing mental well-being
Exclusive discount vouchers on Levi’s products
We are an Equal Opportunity Employer committed to empowering individuals from all walks of life to achieve their professional goals with us, regardless of race, religion, gender, gender identity, pregnancy, disability, sexual orientation, age, national origin, citizenship status, or genetic information. We actively seek and encourage applications from diverse candidates, including those with disabilities, and offer accommodations throughout the selection process upon request.
To ensure that our products and culture continue to incorporate everyone's perspectives and experience, we never discriminate based on race, religion, national origin, gender identity or expression, sexual orientation, age, or marital, veteran, or disability status.
LOCATION
Mexico, D.F., MexicoFULL TIME/PART TIME
Full timeCurrent LS&Co Employees, apply via your Workday account.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation AWS Azure Bash CISO CISSP Cloud Computer Science Cyber crime DNS EDR Forensics GCP Incident response MITRE ATT&CK Monitoring OSINT PowerShell Python Red team Risk management Scripting SIEM Threat intelligence TTPs Vulnerabilities Vulnerability management
Perks/benefits: Health care Medical leave Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.