Security Engineer / Research Analyst– Threat Intelligence/ Threat Hunting at Base Cyber Security
Den Haag, , Netherlands -
Full Time


Start Date

Immediate

Expiry Date

24 Sep, 25

Salary

0.0

Posted On

25 Jun, 25

Experience

3 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Application Security, Ufc, Security, Malware Analysis, Threat Analysis, Cti, Automation, Cloud Security

Industry

Information Technology/IT

Description

Join a growing security research team, bringing on your passion for security, and your expertise and knowledge on the threat analysis, threat intel and threat hunting capabilities –with lots of exposure in variety of complex environments.

REQUIREMENTS:

  • 3+ years of experience in relevant areas, with a relevant background / education and experience in security areas that add value to the threat analysis, CTI and threat hunting sides of security (monitoring and detection, DFIR, malware analysis, application security, cloud security, automation, containerization etc.).
  • Comfortable working with and making the most of large data sets (collection, analysis, response) with an automation mindset and good scripting / dev skills.
  • Strong defensive and offensive security mindset, driving analysis on kill chain/TTPs and utilizing relevant methodologies/ frameworks / techniques /knowledge bases (e.g. Mitre ATT&CK, CKC, UFC ).
Responsibilities

ROLE OVERVIEW:

  • Take on a proactive role on analyzing latest threat actors TTPs, vulnerabilities, turning these into manageable and actionable intelligence that can be applied in various environments.
  • Aid to designing, building and growing the research team’s CTI system / linked systems, better utilizing and optimizing the use of the generated threat intel, making a difference to better protecting a lot of critical and complex environments.
  • Advise and help improve the monitoring, prevention and response capabilities to utilize the research and analysis done, as well as optimizing or finding new techniques that can be applied in the MDR cycle.
  • Guide and work with security defensive teams on improving their prevention and detection, sharing knowledge, experience and being a go to source for advice.
  • Aim for best data collection and analysis, acting on data and reporting on potential threats or actual incidents and protecting assets – finding ways to orchestrate, automate and scale.
  • Take on active campaigns / projects, on threathunting, analysis of specific type of (ransomware, malware) etc.
  • Stay on top of ongoing security threats and overall developments in the security landscape, applying them to environments with different threat models.
Loading...