Threat Intelligence Analyst
Who We Are
Vultr is on a mission to make high-performance cloud infrastructure easy to use, affordable, and locally accessible for enterprises and AI innovators around the world. With 32 cloud data center locations around the world, Vultr is trusted by hundreds of thousands of active customers across 185 countries for its flexible, scalable, global Cloud Compute, Cloud GPU, Bare Metal, and Cloud Storage solutions. Founded by David Aninowsky and self-funded for over a decade, Vultr has grown to become the world’s largest privately-held cloud infrastructure company.
Vultr Cares
- Excellent Medical Benefits w/ 100% company-paid premiums for employee only plan + 100% company-paid dental & vision premiums
- 401(k) plan that matches 100% up to 4% with immediate vesting
- Professional Development Reimbursement of $2,500 each year
- 11 Holidays + Paid Time Off Accrual + Rollover Plan + take your birthday off
- Commitment matters to Vultr! Increased PTO at 3 year & 10 year anniversary + 1 month paid sabbatical every 5 years + Anniversary Bonus each year
- $500 first year remote office setup + $400 each following year for new equipment
- Internet reimbursement up to $75 per month
- Gym membership reimbursement up to $50 per month
- Company-paid Wellable subscription
Join Vultr
The Security Operations team is a central pillar of our growth strategy, and we are looking for a Threat Intelligence Analyst to help drive our vision of a proactive and predictive security posture. You’ll be at the forefront of our threat intelligence efforts, working closely with the broader threat intelligence community to gather and analyze critical data on emerging threats and trends, and using your expertise to inform our defenses and protect our customers.
As a key member of our team, you'll take on the exciting challenge of staying one step ahead of threat actors, and your work will have a direct impact on our ability to detect and respond to potential security threats, ultimately helping to safeguard our business and customers.
What to expect:
- Analyze complex threat intelligence data to inform security decisions
- Develop and maintain relationships with key stakeholders and community partners
- Engage with internal teams to share critical threat intelligence insights
- Build and refine threat profiles to enhance our understanding of emerging threats
- Develop and deliver high-quality reports to senior leadership and other stakeholders
- Investigate and respond to community reports of potential security threats
- Perform thorough analysis of disparate threat intelligence sources
- Evaluate and prioritize threats to ensure effective risk management
- Collaborate with cross-functional teams to drive security improvements
- Stay up-to-date with the latest threat intelligence trends and technologies to continuously enhance our security posture
Our ideal candidate will have:
- 2-3 years of experience in a dynamic IT operations environment, such as a Security Operations Center (SOC), Network Operations Center (NOC), or emergency response team, with a strong foundation in IT security fundamentals and threat analysis
- Proven experience working with complex, sensitive, and potentially untrustworthy data sources, with the ability to distill insights and drive informed decision-making
- Proficiency in scripting languages, such as Python, and experience developing tools and solutions to support threat intelligence and incident response efforts
- In-depth knowledge of Unix-based operating systems, network architectures, and protocols, with the ability to analyze and interpret network traffic, system logs, and other relevant data sources
- Strong understanding of threat intelligence principles, including threat actor tactics, techniques, and procedures (TTPs), and the ability to apply this knowledge to support threat hunting, incident response, and vulnerability management efforts
- Experience with observability tools and frameworks, such as SIEM systems, threat intelligence platforms, and incident response software, with the ability to integrate and analyze data from multiple sources
- Excellent communication and interpersonal skills, with the ability to build strong relationships with cross-functional teams, including security operations, incident response, and threat intelligence teams
- A proven track record of navigating high-pressure, fast-paced environments, with the ability to make quick decisions, escalate issues, and drive complex problems to resolution in a timely and effective manner
Compensation
$85,000 - $100,000
This salary can vary based on location, years of experience, background and skill set.
Vultr is committed to an inclusive workforce where diversity is celebrated and supported. All employment decisions at Vultr are based on business needs, job requirements, and individual qualifications.
Vultr regards the lawful and correct use of personal information as important to the accomplishment of our objectives, to the success of our operations and to maintaining confidence between those with whom we deal and ourselves. As such the use of various key privacy controls enables Vultr’s treatment of personal information to meet current regulatory guidelines and laws.
Workforce members have the right under US state law where and when applicable and certain other privacy and data protection laws, as applicable, to: fair and equal treatment, knowing what personal data we gather and retain, for what purpose, and the ability to access and/or delete such data. You also have the right to opt out of communications from Vultr and approved third- parties at any time.
Create a Job Alert
Interested in building your career at Vultr? Get future opportunities sent straight to your email.
Apply for this job
*
indicates a required field