Security Engineer - Threat Intelligence

Full-time
Ireland
€92k-€124k per year
Posted 1 year ago
Go ad-free with Premium ×
The job listing has expired. Unfortunately, the hiring company is no longer accepting new applications.

To see similar active jobs please follow this link: Remote Development jobs

Role Description

Dropbox Threat Intelligence leverages data-driven insights to understand and counteract potential threats to Dropbox and its users. By analyzing attack patterns and threat actors, we provide actionable intelligence that supports the business in fortifying defences and enhancing security resilience. 

In this role you will investigate critical threats to Dropbox and our customers, profiling threat actors and uncovering the actions, techniques and objectives of these malicious actors. We ensure trust in the Dropbox platform by protecting all users interactions with our products. You will analyze telemetry data to identify signals indicative of malicious activity and abuse. You will help enhance our capabilities by formulating new analytic techniques and working across teams to drive the supporting capabilities. You’ll leverage your understanding of current cybercrime and fraud actor TTPs, experience working with API, network, and host based indicators and scripting expertise to help automate recurring tasks.

Our Engineering Career Framework is viewable by anyone outside the company and describes what’s expected for our engineers at each of our career levels. Check out our blog post on this topic and more here.

Responsibilities

  • Research and analyze evolving threats to anticipate future risks. 

  • Provide deep analytic reports to help business units anticipate and mitigate risks. 

  • Build and maintain strong partnerships with internal stakeholders and external threat intelligence networks to facilitate the exchange of critical information. 

  • Pursue actionable intelligence on cybercrime threats as they relate to Dropbox. 

  • Build and support team automation and investigation tools. 

Many teams at Dropbox run Services with on-call rotations, which entails being available for calls during both core and non-core business hours. If a team has an on-call rotation, all engineers on the team are expected to participate in the rotation as part of their employment. Applicants are encouraged to ask for more details of the rotations to which the applicant is applying.

Requirements

  • 3 years of combined experience in either incident response, threat intelligence, threat hunting, or cybercrime investigations.

  • Experience in one or more information security domains: threat Intelligence analysis and research - security monitoring/detection and incident response - security architectures, principles, and assessment methodologies - network and operating systems security - development of security tooling.

  • Technical domain knowledge with Linux, Windows, or MacOS based systems - network infrastructure - cloud products (e.g. AWS, GCP, Azure).

  • Proficiency using Python or Go.

Preferred Qualifications

  • Malware analysis and digital forensics.

  • Experience with deep/dark web forums, malware, threat modeling, security vulnerabilities, exploitation techniques, and methods for remediation.

  • Strong demonstrated knowledge of common offensive techniques, and an in-depth knowledge of UNIX tools and architecture.

Compensation

Go ad-free with Premium ×
About the Job
Full-time
Ireland
€92k-€124k per year
Posted 1 year ago
Check if your resume is a good fit
25/100
Get Full Report
+ 1,284 new jobs added today
30,000+
Remote Jobs

Don't miss out — new listings every hour

Join Premium

Security Engineer - Threat Intelligence

The job listing has expired. Unfortunately, the hiring company is no longer accepting new applications.

To see similar active jobs please follow this link: Remote Development jobs

Role Description

Dropbox Threat Intelligence leverages data-driven insights to understand and counteract potential threats to Dropbox and its users. By analyzing attack patterns and threat actors, we provide actionable intelligence that supports the business in fortifying defences and enhancing security resilience. 

In this role you will investigate critical threats to Dropbox and our customers, profiling threat actors and uncovering the actions, techniques and objectives of these malicious actors. We ensure trust in the Dropbox platform by protecting all users interactions with our products. You will analyze telemetry data to identify signals indicative of malicious activity and abuse. You will help enhance our capabilities by formulating new analytic techniques and working across teams to drive the supporting capabilities. You’ll leverage your understanding of current cybercrime and fraud actor TTPs, experience working with API, network, and host based indicators and scripting expertise to help automate recurring tasks.

Our Engineering Career Framework is viewable by anyone outside the company and describes what’s expected for our engineers at each of our career levels. Check out our blog post on this topic and more here.

Responsibilities

  • Research and analyze evolving threats to anticipate future risks. 

  • Provide deep analytic reports to help business units anticipate and mitigate risks. 

  • Build and maintain strong partnerships with internal stakeholders and external threat intelligence networks to facilitate the exchange of critical information. 

  • Pursue actionable intelligence on cybercrime threats as they relate to Dropbox. 

  • Build and support team automation and investigation tools. 

Many teams at Dropbox run Services with on-call rotations, which entails being available for calls during both core and non-core business hours. If a team has an on-call rotation, all engineers on the team are expected to participate in the rotation as part of their employment. Applicants are encouraged to ask for more details of the rotations to which the applicant is applying.

Requirements

  • 3 years of combined experience in either incident response, threat intelligence, threat hunting, or cybercrime investigations.

  • Experience in one or more information security domains: threat Intelligence analysis and research - security monitoring/detection and incident response - security architectures, principles, and assessment methodologies - network and operating systems security - development of security tooling.

  • Technical domain knowledge with Linux, Windows, or MacOS based systems - network infrastructure - cloud products (e.g. AWS, GCP, Azure).

  • Proficiency using Python or Go.

Preferred Qualifications

  • Malware analysis and digital forensics.

  • Experience with deep/dark web forums, malware, threat modeling, security vulnerabilities, exploitation techniques, and methods for remediation.

  • Strong demonstrated knowledge of common offensive techniques, and an in-depth knowledge of UNIX tools and architecture.

Compensation