Telecommunications Sector | Threat Hunter
Lisboa, Portugal
Devoteam
Transform your bussines with Devoteam, the AI-driven tech consulting. Become a leading company embracing AI for sustainable value.Company Description
At Devoteam, we believe that technology with strong human values can actively drive change for the better. Discover how Tech for People unlocks the future, creating a positive impact on the people and the world around us. We are a global leading player in Digital Transformation for leading organisations across EMEA, with a revenue of €1B. We believe in transforming technology to create value for our clients, partners and employees in a world where technology is developed for people. We are proud of the culture we have built together. We are proud of our people at the service of technology. We are proud of our diverse environment. Because we are #TechforPeople. Join our multidisciplinary team of Cloud experts, Designers, Business consultants, Security experts, Engineers, Developers and other extraordinary talents, spread across more than 20 EMEA countries. Become one of our +10.000 tech and business leaders on cloud, data and cyber security. Let’s fuse creativity with technology together and build innovative solutions that actively change things for the better.
Job Description
We are seeking a highly skilled and motivated Threat Analyst to join our cybersecurity team. The ideal candidate will be responsible for identifying and investigating cybersecurity threats, detecting potential data leaks, analyzing criminal activity, conducting deep web and dark web monitoring, producing IOCs, and performing malware analysis.
Key Responsibilities:
- Threat Analysis: Monitor, detect, and analyze emerging threats across various attack vectors. Investigate suspicious activities that could indicate a security breach or advanced persistent threats (APTs).
- Leak Detection: Identify and assess potential leaks of sensitive data across public and private channels, ensuring prompt detection and response.
- Criminal Activity Analysis: Investigate activities related to potential criminal behavior within the organization’s systems, focusing on fraud, hacking, or other illegal actions.
- Deep Web and Dark Web Monitoring: Conduct research and analysis on deep web and dark web forums to detect the sale or exchange of sensitive data, malware, or attack tools targeting the organization.
- IOC Production: Develop and maintain Indicators of Compromise (IOCs) including IP addresses, file hashes, URLs, and other threat intelligence to support threat detection and incident response.
- Malware Analysis: Reverse-engineer and analyze malware to understand its behavior, identify vulnerabilities it exploits, and create effective countermeasures or detection signatures.
Qualifications
- Previous experience in cybersecurity, threat analysis, or incident response.
- Familiarity with dark web research tools and criminal activity monitoring platforms (e.g., DarkOwl, Intelligence X).
- Proficiency with threat analysis tools and frameworks (e.g., MITRE ATT&CK, STIX/TAXII).
- Experience in deep web and dark web monitoring tools and techniques.
- Strong analytical skills in identifying leaks, suspicious activity, and malware.
- Familiarity with reverse engineering tools for malware analysis (e.g., IDA Pro, Ghidra, OllyDbg).
- Knowledge of SIEM, endpoint detection, and network traffic analysis tools.
- Scripting skills (e.g., Python, PowerShell) for automation and IOC generation.
Additional Information
The Devoteam Group works for equal opportunities, promoting its employees based on merit and actively fights against all forms of discrimination. We are convinced that diversity contributes to the creativity, dynamism and excellence of our organization. All of our vacancies are open to people with disabilities.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation Cloud Exploits Ghidra IDA Pro Incident response Malware MITRE ATT&CK Monitoring OllyDbg PowerShell Python Reverse engineering Scripting SIEM Threat detection Threat intelligence Vulnerabilities
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.