Chainlink Labs

Cyber Threat Analyst

Chainlink Labs

full-time

Posted on:

Location Type: Remote

Location: Remote • 🇺🇸 United States

Visit company website
AI Apply
Apply

Job Level

JuniorMid-Level

Tech Stack

Cyber SecurityDNSGoPythonRustWeb3

About the role

  • Proactively track malicious infrastructure, hunt for new malware samples, and adversary tools to identify new adversary tooling, detection opportunities, and mitigation strategies.
  • Create precise detection rules (e.g., YARA, Sigma) and develop custom tools and scripts to identify malicious activity proactively.
  • Conduct deep-dive intelligence analysis and investigations related to suspicious activity and attempted attacks.
  • Serve as an SME for malware reverse engineering, with a focus on ARM binaries.
  • Maintain a working knowledge of adversarial tactics and techniques, and how they are being used to achieve current objectives.
  • Collaborate with and support the investigations of other Cybersecurity Operations and Information Security teams.

Requirements

  • At least two years of experience in cyber threat analysis or threat investigations.
  • Demonstrated a high-level understanding of recent cyber trends, campaigns, incidents, and threat actor groups.
  • Familiarity with Vertex Synapse and its Storm scripting language or experience with similar intelligence analysis tools.
  • Real-life experience in detection engineering, including using SIEMs and writing effective detection rules in YARA or Sigma.
  • Experience using technical data sources like file repositories, passive DNS, or internet service scans for threat research purposes.
  • Understanding of network protocols such as HTTP, DNS, TLS.
  • Prior experience with automated malware sandboxes to analyze malicious samples and identify detection opportunities. Proficiency with reverse engineering tools, such as Binary Ninja and Ghidra.
  • In-depth understanding of threats targeting the blockchain ecosystem, especially in relation to their tools and tradecraft, and how web2 threats affect web3 systems.
  • Proven track record of building and maintaining logging, analysis, or enrichment pipelines, preferred languages include Python, Rust or Golang.
  • Excellent verbal and written communication skills with prior experience in presenting research findings to internal and external stakeholders.
  • Understanding of structured analytic techniques to help mitigate bias in analysis.
Benefits
  • Commitment to Equal Opportunity
  • Global Data Privacy Notice for Job Candidates and Applicants

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
malware analysisdetection engineeringYARASigmareverse engineeringPythonRustGolangnetwork protocolsstructured analytic techniques
Soft skills
communicationcollaborationinvestigative skillsproblem-solvinganalytical thinking
Foundation

Lead Revenue Cycle Intelligence Analyst

Foundation
Seniorfull-time$61–$99🇺🇸 United States
Posted: 18 hours agoSource: aa067.taleo.net
CrowdStrike

Threat Hunter

CrowdStrike
Mid · Seniorfull-time$70k–$95k / yearAlaska, California, Hawaii, Nevada, Washington · 🇺🇸 United States
Posted: 19 hours agoSource: crowdstrike.wd5.myworkdayjobs.com
CloudCyber SecurityLinuxMacOS