What will I be doing:
You will be part of a dynamic team working closely with Development, Analyst, and customer facing teams. The role involves reviewing and processing cyber threat intelligence, identifying misconfigurations and potential attack paths, and conducting threat analysis assessments. Other responsibilities will include but not be limited to:
* Evaluating detection posture and addressing alerting gaps across various customers,
* Producing proof of concept data visualizations and scripted analytic pipelines to investigate emerging threats and vulnerabilities within the Darktrace product suite.
This is a hybrid role, and the expectation is to work a minimum of 2 days a week in the Cambridge office.
What experience do I need:
The right individual will have experience in cloud environments, particularly AWS, and a keen interest in threat intelligence. If you have strong communication skills, knowledge of Python, and a drive to fully understand problems and their solutions. The right candidate will also be able to demonstrate:
* Knowledge of emerging vulnerabilities and new/trending hacking techniques and tactics across a range of domains and infrastructures,
* Ability to work independently and communicate with multiple different stakeholders.
Benefits we offer:
* 23 days’ holiday + all public holidays, rising to 25 days after 2 years of service,
* Additional day off for your birthday,
* Private medical insurance which covers you, your cohabiting partner and children,
* Life insurance of 4 times your base salary,
* Salary sacrifice pension scheme,
* Enhanced family leave,
* Confidential Employee Assistance Program,
* Cycle to work scheme.
#J-18808-Ljbffr