Simplify Logo

Full-Time

Threat Analyst

Updated on 9/26/2024

Threatlocker

Threatlocker

201-500 employees

Provides enterprise cybersecurity software solutions

Cybersecurity

Mid

Orlando, FL, USA

Category
Cybersecurity
IT & Security
Required Skills
TCP/IP
PowerShell
Bash
Python
Development Operations (DevOps)
Requirements
  • Bachelor’s degree in information security, Cybersecurity, Computer Science, or a related field (or equivalent experience).
  • 3+ years of experience in a security-focused role, preferably in detection, monitoring, or incident response.
  • Strong familiarity with SIEM tools, EDR tools, and IDS/IPS systems.
  • Knowledge of network security technologies and protocols (TCP/IP, DNS, VPNs, firewalls, etc.).
  • Proficiency in scripting languages such as Python, PowerShell, or Bash.
  • Proficiency in custom SNORT, SIGMA, and YARA rule creation.
  • Understanding of malware behavior, attack vectors, and vulnerability exploitation techniques.
Responsibilities
  • Monitor security tools and systems (SIEM, IDS/IPS, EDR, etc.) for suspicious activity or breaches.
  • Analyze security alerts and data to identify potential threats, vulnerabilities, and compromises.
  • Build and refine detection capabilities using security tools, threat intelligence, and machine learning models.
  • Lead and participate in the response to security incidents (investigating, containing, eradicating, and recovering from threats).
  • Collaborate with cross-functional teams to develop incident handling processes and ensure timely remediation.
  • Create detailed post-incident reports, including root cause analysis and recommendations for improvements.
  • Develop automated tools and scripts to enhance security detection capabilities and streamline threat detection workflows.
  • Maintain and enhance detection tools, including writing custom SNORT, SIGMA, and YARA rules, and updating rulesets in accordance with new threats.
  • Conduct forensic analysis and threat hunting to identify malicious activity.
  • Review logs from various systems (e.g., firewalls, servers, network devices) to uncover unauthorized activities.
  • Research and stay current on emerging threats, vulnerabilities, and cyber-attack techniques.
  • Contribute to the enhancement of security monitoring tools, processes, and playbooks.
  • Develop automated scripts and tools to improve detection and response efficiency.
  • Work closely with DevOps, Network, and Security Engineering teams to ensure secure architectures and systems.
  • Leverage internal and external threat intelligence sources to stay informed about the latest security trends and threats.
  • Share insights with internal stakeholders to ensure proactive measures are in place.
  • Ensure security processes and procedures align with regulatory requirements and industry best practices (e.g., NIST, CIS, ISO 27001).
  • Assist in the preparation of audit reports and security assessments.

ThreatLocker offers enterprise security software that protects organizations from data breaches and cyber threats. Their main product, ThreatLocker Protect, blocks untrusted software and restricts applications from running unless explicitly allowed, effectively preventing ransomware and other malicious attacks. The company stands out with its fast customer support, responding in under 60 seconds, and its ability to help clients comply with various regulations. ThreatLocker's goal is to enhance clients' cybersecurity while providing cost-effective solutions.

Company Stage

N/A

Total Funding

$157.4M

Headquarters

Maitland, Florida

Founded

2017

Growth & Insights
Headcount

6 month growth

28%

1 year growth

56%

2 year growth

150%
Simplify Jobs

Simplify's Take

What believers are saying

  • The recent $115 million Series D funding will drive significant R&D, support, and marketing efforts, potentially doubling the workforce.
  • Recognition as a CRN 2023 Product of the Year finalist and Channel Program's Category Leader in Zero Trust Security highlights ThreatLocker's industry impact and innovation.
  • Expansion into new markets, such as the Australian data center, indicates strong growth potential and global reach.

What critics are saying

  • The competitive cybersecurity landscape requires continuous innovation to maintain market leadership.
  • Rapid expansion and workforce doubling could strain organizational resources and affect service quality.

What makes Threatlocker unique

  • ThreatLocker's zero trust approach and least-privilege model set it apart from traditional detect-and-respond cybersecurity solutions.
  • Their rapid customer support response time of less than 60 seconds is a significant competitive advantage in the cybersecurity market.
  • The comprehensive ThreatLocker Control Suite, which includes Application Whitelisting, Ringfencing, Storage Control, and Elevation Control, offers a robust and integrated security solution.