
Security Architect
Atos
full-time
Posted on:
Location Type: Office
Location: Bydgoszcz • 🇵🇱 Poland
Visit company websiteJob Level
Mid-LevelSenior
About the role
- Play a key role in uncovering and analyzing emerging cyber threats.
- Focus on deep research into threat actors, malware campaigns, and evolving TTPs, using both open-source and proprietary intelligence sources.
- Engage in advanced threat research projects under Threat Research Center umbrella.
Requirements
- Ability to navigate the entire CTI lifecycle - from intelligence collection and processing to deep analysis and strategic dissemination.
- Understanding of the Diamond Model and Cyber Kill Chain, with the ability to pivot across diamond vertices and map threat actor behaviors throughout all phases.
- Strong proficiency in analyzing and correlating threat data from diverse external sources such like VirusTotal, URLScan.io, GreyNoise, DomainTools, Shodan, Censys etc.
- Ability to extract actionable intelligence from raw signals/indicators and enrich research with multi-source context.
- Experience in malware analysis and creating and using YARA rules for conducting research across external sources, with the ability to identify patterns, classify malicious artifacts, and enrich intelligence through behavioral signatures.
- Hands-on expertise with CTI tools (e.g., MISP, ThreatConnect, Recorded Future, ZeroFox, CybelAngel, HudsonRock).
- Practical experience in identifying and tracking threat actors, campaigns, and emerging trends, with deep knowledge of evolving threats and the current modus operandi of adversaries.
- Proactive and self-motivated, with a passion for innovation and continuous learning in the evolving landscape of emerging threats and adversaries TTPs.
- Skilled in navigating dark web marketplaces, forums, and leak sites to identify threat actor activity and extract actionable intelligence.
Benefits
- Great development opportunities including financing of world class trainings and certifications
- Engaging in real-world threat intelligence operations, including dark net monitoring and actor profiling
- Continuous work with emerging TTPs, threat actor tradecrafts, and evolving attack surfaces across industries
- Management without constant nagging and endless meetings
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
cyber threat analysismalware analysisYARA rulesthreat data correlationintelligence collectionstrategic disseminationthreat actor behavior mappingactionable intelligence extractionbehavioral signaturesdeep research
Soft skills
proactiveself-motivatedpassion for innovationcontinuous learning