Collaborate with our internal teams and customers to proactively identify threats to reduce risk to client businesses, networks, and operations
Leverage your expertise to produce high-quality tactical and strategic assessments, communicating potential risks and their impact through concise written analysis and compelling visual presentations, directly informing decision-makers.
Utilize Flashpoint's cutting-edge proprietary tools and external data sources to synthesize critical information, enhancing analysis and alerting
Synthesize raw data to identify the credibility of information, deduce relevance to the client, and nominate new collection sources in support of Flashpoint collections.
Develop keywords/patterns to highlight high signal data for cyber threats, including supply chain attacks, emerging threats, and zero-day vulnerabilities.
Help protect Flashpoint customers by providing critical intelligence on data breaches and threat actor activities, supporting mitigation efforts, including domain takedown requests, to protect brand reputation and counter sophisticated threats.
Research and provide intelligence on technical indicators that could signal a cyber attack.
Provide weekly reporting to customer stakeholders, including the customer leadership team and technical leaders.
Understand and articulate security safeguards while safely navigating virtual environments to support assigned tasks.
Requirements
Experience in cyber threat intelligence, threat research, or threat hunting, actively keeping up with the latest threats
Strong analytical and writing skills, with the ability to rapidly and accurately break down technical topics and effectively assess and communicate risks and potential impacts to a wide variety of audiences
Exposure to risks facing large corporations and defensive measures employed to mitigate them
Experience sifting through large amounts of data to identify threats
Proficient in utilizing open source command line tools, internally built tools, or external industry standard tools to find relevant data or risks
Familiarity with Indicators of Compromise (IOCs) and mitigation strategies to protect client networks from them
Engage security community to assist in proactive disruption of malicious infrastructure affecting client operations
Translate customer intelligence requirements into an action plan for identifying threats and risks to their organizations
This position requires working hours aligned with the Central Time Zone.
Benefits
Diversity. Flashpoint is committed to fostering, cultivating and preserving a culture of diversity, inclusion, belonging, and equity. We recognize that diversity is key to achieving our vision. We believe that every person and their experiences contribute to building a work environment and products and services that will change the world.
Culture and Belonging. Our company’s culture isn’t something you join, it’s something you build and shape, and each person's unique backgrounds and experiences contribute to who Flashpoint is and will become. You will have ample opportunities to connect with coworkers through various communication channels and company-funded virtual events: book clubs, happy hours, committees, DIBE discussion group, Donut mixers, local team member meetups and much more.
Perks. Flashpoint understands that personal wellness is one of the keys to a happy, healthy and productive work environment. That’s why we also prioritize health and wellness perks like gym reimbursements, expensed lunches, cool cultural initiatives and inclusive employee events.
Career Growth. **Flashpoint is invested in the growth of our team members and understands that frequent, two-way feedback is critical to that growth. We encourage regular one-on-ones with your manager, a regular schedule of performance reviews, learning and development opportunities, and guidance through formalized career paths; whether that be towards being a great manager, being a great individual contributor, or a lateral move to gain breadth of knowledge and experience.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
cyber threat intelligencethreat researchthreat huntingdata analysisrisk assessmentIndicators of Compromise (IOCs)data breach intelligencemitigation strategiesopen source command line toolsdata synthesis
Soft skills
analytical skillswriting skillscommunication skillscollaborationproblem-solvingpresentation skillsattention to detailadaptabilitycritical thinkingstakeholder engagement