Full-Time

Threat Analyst

Confirmed live in the last 24 hours

Threatlocker

Threatlocker

501-1,000 employees

Provides enterprise cybersecurity software solutions

Enterprise Software
Cybersecurity

Mid

Orlando, FL, USA

Category
Cybersecurity
IT & Security
Required Skills
PowerShell
Bash
Python
Requirements
  • Bachelor’s degree in information security, Cybersecurity, Computer Science, or a related field (or equivalent experience).
  • 3+ years of experience in a security-focused role, preferably in detection, monitoring, or incident response.
  • Strong familiarity with SIEM tools, EDR tools, and IDS/IPS systems.
  • Knowledge of network security technologies and protocols (TCP/IP, DNS, VPNs, firewalls, etc.).
  • Proficiency in scripting languages such as Python, PowerShell, or Bash.
  • Proficiency in custom SNORT, SIGMA, and YARA rule creation.
  • Understanding of malware behavior, attack vectors, and vulnerability exploitation techniques.
  • GIAC Certified Intrusion Analyst (GCIA) (Preferred)
  • GIAC Security Essentials Certification (GSEC) (Preferred)
  • Certified Information Systems Security Professional (CISSP) (Preferred)
  • Certified Ethical Hacker (CEH) (Preferred)
  • OffSec Certified Professional (OSCP) (Preferred)
  • CompTIA Certs (Preferred)
  • Security + (Preferred)
  • Network + (Preferred)
  • Pentest + (Preferred)
  • CASP+ (Preferred)
  • Excellent analytical and problem-solving abilities.
  • Ability to work under pressure and manage multiple detection initiatives simultaneously.
  • Strong written and verbal communication skills, with an ability to present technical concepts clearly.
  • Detail-oriented with the ability to quickly assess security issues and provide appropriate remediation actions.
Responsibilities
  • Monitor security tools and systems (SIEM, IDS/IPS, EDR, etc.) for suspicious activity or breaches.
  • Analyze security alerts and data to identify potential threats, vulnerabilities, and compromises.
  • Build and refine detection capabilities using security tools, threat intelligence, and machine learning models.
  • Lead and participate in the response to security incidents (investigating, containing, eradicating, and recovering from threats).
  • Collaborate with cross-functional teams to develop incident handling processes and ensure timely remediation.
  • Create detailed post-incident reports, including root cause analysis and recommendations for improvements.
  • Develop automated tools and scripts to enhance security detection capabilities and streamline threat detection workflows.
  • Maintain and enhance detection tools, including writing custom SNORT, SIGMA, and YARA rules, and updating rulesets in accordance with new threats.
  • Conduct forensic analysis and threat hunting to identify malicious activity.
  • Review logs from various systems (e.g., firewalls, servers, network devices) to uncover unauthorized activities.
  • Research and stay current on emerging threats, vulnerabilities, and cyber-attack techniques.
  • Contribute to the enhancement of security monitoring tools, processes, and playbooks.
  • Develop automated scripts and tools to improve detection and response efficiency.
  • Work closely with DevOps, Network, and Security Engineering teams to ensure secure architectures and systems.
  • Leverage internal and external threat intelligence sources to stay informed about the latest security trends and threats.
  • Share insights with internal stakeholders to ensure proactive measures are in place.
  • Ensure security processes and procedures align with regulatory requirements and industry best practices (e.g., NIST, CIS, ISO 27001).
  • Assist in the preparation of audit reports and security assessments.

ThreatLocker offers enterprise security software that protects organizations from data breaches and cyber threats. Their main product, ThreatLocker Protect, blocks untrusted software and restricts applications from running unless explicitly allowed, effectively preventing ransomware and other malicious attacks. The company stands out with its fast customer support, responding in under 60 seconds, and helps clients comply with regulations like NIST and HIPAA. ThreatLocker's goal is to enhance cybersecurity for enterprises while providing a cost-effective solution compared to traditional methods.

Company Stage

Series D

Total Funding

$295M

Headquarters

Maitland, Florida

Founded

2017

Growth & Insights
Headcount

6 month growth

32%

1 year growth

63%

2 year growth

120%
Simplify Jobs

Simplify's Take

What believers are saying

  • The recent $115 million Series D funding will drive significant R&D, support, and marketing efforts, potentially doubling the workforce.
  • Recognition as a CRN 2023 Product of the Year finalist and Channel Program's Category Leader in Zero Trust Security highlights ThreatLocker's industry impact and innovation.
  • Expansion into new markets, such as the Australian data center, indicates strong growth potential and global reach.

What critics are saying

  • The competitive cybersecurity landscape requires continuous innovation to maintain market leadership.
  • Rapid expansion and workforce doubling could strain organizational resources and affect service quality.

What makes Threatlocker unique

  • ThreatLocker's zero trust approach and least-privilege model set it apart from traditional detect-and-respond cybersecurity solutions.
  • Their rapid customer support response time of less than 60 seconds is a significant competitive advantage in the cybersecurity market.
  • The comprehensive ThreatLocker Control Suite, which includes Application Whitelisting, Ringfencing, Storage Control, and Elevation Control, offers a robust and integrated security solution.

Help us improve and share your feedback! Did you find this helpful?