Please return soon to complete your dream job application!
Lead Threat Research Analyst
OPENTEXT - THE INFORMATION COMPANY
As the Information Company, our mission at OpenText is to create software solutions and deliver services that redefine the future of digital. Be part of a winning team that leads the way in Enterprise Information Management.
Your Impact:
Do the phrases “Advanced Persistent Threat” or “Adversary Signal Analysis” pique your interest? If so, you could be the cybersecurity professional we need to search for Global Adversary Threats and protect our clients against ongoing cyber threats across the globe.
As a Global Adversary Signal Threat Hunter, you will work closely with our senior Threat Research team to identify and investigate adversarial threats against our customers covered space. You will help to find those hard to detect attacks and provide actionable threat intelligence to our customers. If you ever questioned if the work you do will make a difference, come, and work on our Threat Hunting teams and experience the difference you can make!
What the role offers:
- Work with a unique combination of adversary signals, leading edge threat intel and analytical software to find emerging threats that are not seen anywhere else!
- Follow the emerging threats and attack actors to understand emerging trends and tactics being used to advance attacks against our customers.
- Identify, analyze, and define the attack path of advanced attacks and potential intrusions.
- Produce reports that can form the basis for new behavioral models and threat content.
- Maintain situational awareness of cyber activity by reviewing new anomalies and tracking attack campaigns through their attack cycle.
- Track threat actors, their tactics, techniques, and procedures (TTPs), and their associated Indicators of Compromise (IOCs) through the analytics.
- Follow the analytic results leveraging additional search techniques.
What you need to Succeed:
- Understanding the cybersecurity landscape
- Deep knowledge of current and past threat actors’ methods, attack methodologies, and TTPs (Tactics, Techniques, Procedures)
- Strong understanding of current attacker tradecraft
- Define client relationships and understand the critical assets in their environment to develop additional detection patterns.
- Experience with the incident response process, including detecting advanced adversaries, network activity analysis and enabling exploits.
- Knowledge and experience of tracing and identifying adversarial attacks and the tactics used to launch and execute their campaigns.
- Working with the Cyber Kill Chain Model, MITER ATT&CK Matrix.
- Knowledge of Networking and Network Protocols
- An extensive knowledge of Networking both inside and outside of the network edge.
- Knowledge of routers, gateways, and firewalls
- Deep understanding of Network Address Translation, IP Protocols, and associated services.
- Understanding of DNS and fast flux DNS.
- Experience with Internet routing (BGP routing, BGP counters), BOGONS, TOR Networking, DNS and cloud service providers.
- Technical Writing and Reporting Skills
- Experience preparing security reports and different technical documents.
One last thing:
- You are persistent and inquisitive. You have to understand why things are happening the way they are.
- You are determined to understand cyber attack techniques at a very detailed level.
- You are a self-starter who is able to work with minimal management, however have strong collaboration and interpersonal skills to work together with several other professionals from other information security fields.
- You’re a creative thinker who wants to answer the question, “Why?”
- Your workstation is a pyramid of monitors that you can't take your eyes off of at the risk of missing something.
- You have a desire to learn new technologies.
- Your sense of humor, passion and enthusiasm shines through in everything you do.
OpenText's efforts to build an inclusive work environment go beyond simply complying with applicable laws. Our Employment Equity and Diversity Policy provides direction on maintaining a working environment that is inclusive of everyone, regardless of culture, national origin, race, color, gender, gender identification, sexual orientation, family status, age, veteran status, disability, religion, or other basis protected by applicable laws. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please contact us at hr@opentext.com.