Full-Time

Threat Analyst

Confirmed live in the last 24 hours

Threatlocker

Threatlocker

501-1,000 employees

Provides enterprise cybersecurity software solutions

Enterprise Software
Cybersecurity

Mid

Orlando, FL, USA

Category
Cybersecurity
IT & Security
Required Skills
PowerShell
Bash
Python
Requirements
  • Bachelor’s degree in information security, Cybersecurity, Computer Science, or a related field (or equivalent experience).
  • 3+ years of experience in a security-focused role, preferably in detection, monitoring, or incident response.
  • Strong familiarity with SIEM tools, EDR tools, and IDS/IPS systems.
  • Knowledge of network security technologies and protocols (TCP/IP, DNS, VPNs, firewalls, etc.).
  • Proficiency in scripting languages such as Python, PowerShell, or Bash.
  • Proficiency in custom SNORT, SIGMA, and YARA rule creation.
  • Understanding of malware behavior, attack vectors, and vulnerability exploitation techniques.
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Security Essentials Certification (GSEC)
  • Certified Information Systems Security Professional (CISSP)
  • Certified Ethical Hacker (CEH)
  • OffSec Certified Professional (OSCP)
  • CompTIA Certs
  • Security +
  • Network +
  • Pentest +
  • CASP+
  • Excellent analytical and problem-solving abilities.
  • Ability to work under pressure and manage multiple detection initiatives simultaneously.
  • Strong written and verbal communication skills, with an ability to present technical concepts clearly.
  • Detail-oriented with the ability to quickly assess security issues and provide appropriate remediation actions.
Responsibilities
  • Monitor security tools and systems (SIEM, IDS/IPS, EDR, etc.) for suspicious activity or breaches.
  • Analyze security alerts and data to identify potential threats, vulnerabilities, and compromises.
  • Build and refine detection capabilities using security tools, threat intelligence, and machine learning models.
  • Lead and participate in the response to security incidents (investigating, containing, eradicating, and recovering from threats).
  • Collaborate with cross-functional teams to develop incident handling processes and ensure timely remediation.
  • Create detailed post-incident reports, including root cause analysis and recommendations for improvements.
  • Develop automated tools and scripts to enhance security detection capabilities and streamline threat detection workflows.
  • Maintain and enhance detection tools, including writing custom SNORT, SIGMA, and YARA rules, and updating rulesets in accordance with new threats.
  • Conduct forensic analysis and threat hunting to identify malicious activity.
  • Review logs from various systems (e.g., firewalls, servers, network devices) to uncover unauthorized activities.
  • Research and stay current on emerging threats, vulnerabilities, and cyber-attack techniques.
  • Contribute to the enhancement of security monitoring tools, processes, and playbooks.
  • Develop automated scripts and tools to improve detection and response efficiency.
  • Work closely with DevOps, Network, and Security Engineering teams to ensure secure architectures and systems.
  • Leverage internal and external threat intelligence sources to stay informed about the latest security trends and threats.
  • Share insights with internal stakeholders to ensure proactive measures are in place.
  • Ensure security processes and procedures align with regulatory requirements and industry best practices (e.g., NIST, CIS, ISO 27001).
  • Assist in the preparation of audit reports and security assessments.

ThreatLocker provides enterprise security software solutions aimed at protecting organizations from data breaches and cyber threats. Their main product, ThreatLocker Protect, prevents untrusted software from running by blocking applications and scripts unless they are explicitly allowed. This approach helps to stop ransomware and other malicious software from exploiting legitimate tools. The company differentiates itself from competitors through its host-based firewall that dynamically controls network traffic and offers access controls, along with a U.S.-based support team known for its quick response times, typically under 60 seconds. Additionally, ThreatLocker assists clients in achieving compliance with various regulations such as NIST, HIPAA, CIS, and PCI. The goal of ThreatLocker is to enhance their clients' cybersecurity posture while providing cost-effective solutions compared to traditional detect and respond models.

Company Stage

Series D

Total Funding

$295M

Headquarters

Maitland, Florida

Founded

2017

Growth & Insights
Headcount

6 month growth

21%

1 year growth

60%

2 year growth

114%
Simplify Jobs

Simplify's Take

What believers are saying

  • ThreatLocker raised $115 million to enhance R&D and expand product capabilities.
  • Recognition in industry reports boosts ThreatLocker's brand reputation and customer trust.
  • Growing demand for Zero Trust solutions increases market opportunities for ThreatLocker.

What critics are saying

  • Emerging cybersecurity startups may challenge ThreatLocker's market position.
  • Global shortage of cybersecurity professionals could impact ThreatLocker's hiring.
  • Economic downturns may reduce client spending on cybersecurity solutions.

What makes Threatlocker unique

  • ThreatLocker specializes in Zero Trust endpoint protection and application whitelisting.
  • Their U.S.-based support team offers response times typically under 60 seconds.
  • ThreatLocker Protect blocks untrusted software, preventing ransomware and malicious software.

Help us improve and share your feedback! Did you find this helpful?