Senior Intelligence Analyst
About Zscaler
Zscaler accelerates digital transformation so our customers can be more agile, efficient, resilient, and secure. Our cloud native Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location.
Here, impact in your role matters more than title and trust is built on results. We believe in transparency and value constructive, honest debate—we’re focused on getting to the best ideas, faster. We build high-performing teams that can make an impact quickly and with high quality. To do this, we are building a culture of execution centered on customer obsession, collaboration, ownership and accountability.
We value high-impact, high-accountability with a sense of urgency where you’re enabled to do your best work and embrace your potential. If you’re driven by purpose, thrive on solving complex challenges and want to make a positive difference on a global scale, we invite you to bring your talents to Zscaler and help shape the future of cybersecurity.
The Red Canary Intelligence Team conducts in-depth analysis to provide context and help prioritize where to focus detection and response efforts. As a key contributor, you will investigate raw telemetry, analyze suspicious and confirmed threats, and conduct open-source research to associate activity with known adversaries. A significant focus is on modeling and analyzing in the Synapse graph database. Curiosity, adaptability, and a passion for addressing evolving threats will be vital for success in this dynamic, mission-driven team.
We're looking for an experienced Senior Intelligence Analyst to join our Intelligence team. Reporting to the Senior Manager, Intelligence, you'll be responsible for:
- Utilizing Synapse and Storm Query Language for data modeling and analytic workflows to identify patterns and trends that can be disseminated to customers
- Investigating telemetry to identify new activity clusters based on analysis of malicious and suspicious behaviors and activity observed across our customer base
- Conducting open and closed source research to analyze threat patterns and trends, writing actionable intelligence products to customers and the community to communicate TTPs, detection coverage, and remediation strategies
- Actively engaging with internal teams, external partners, customers, and the infosec community to share knowledge and enhance collaboration
- Validating Red Canary’s endpoint, cloud, and identity detection coverage against the continuously evolving threat landscape and identify unique or emerging threats to build detection coverage for. Recommending solutions to visibility gaps in telemetry and data sources
What We’re Looking for (Minimum Qualifications)
- Strong analytical and problem-solving skills, including the ability to synthesize complex and contradictory information, specifically through utilizing graph databases, or with query languages and data platforms such as SQL, Splunk, Elasticsearch, or Synapse Storm
- Knowledge of cyber threat intelligence concepts including attribution, group naming, making assessments, and pivoting. Familiarity with the mechanics of attack behaviors and MITRE ATT&CK ®.
- Experience tracking adversaries, including threat groups, activity groups, or malware families, and ability to differentiate unique and shared characteristics of clusters.
- Outstanding communication skills, both written and verbal, including the ability to communicate technical concepts in a clear, succinct fashion to subject matter and non-subject matter experts alike.
- Experience in Intelligence, Security Operations Center (SOC), Digital Forensics and Incident Response (DFIR), or other security-focused roles
What Will Make You Stand Out (Preferred Qualifications)
- Proven leadership mentoring team members and contributing to the development of intelligence analysis expertise.
- Experience in threat hunting, endpoint telemetry analysis, and/or Detections Development.
- Experience performing dynamic analysis and triage on suspected malicious samples for the purpose of confirming malicious behavior and to extract relevant indicators of compromise and other findings
#Remote
#LI-DB1
Zscaler’s salary ranges are benchmarked and are determined by role and level. The range displayed on each job posting reflects the minimum and maximum target for new hire salaries for the position across all US locations and could be higher or lower based on a multitude of factors, including job-related skills, experience, and relevant education or training.
The base salary range listed for this full-time position excludes commission/ bonus/ equity (if applicable) + benefits.
Base Pay Range
$119,000 - $170,000 USD
At Zscaler, we are committed to building a team that reflects the communities we serve and the customers we work with. We foster an inclusive environment that values all backgrounds and perspectives, emphasizing collaboration and belonging. Join us in our mission to make doing business seamless and secure.
Our Benefits program is one of the most important ways we support our employees. Zscaler proudly offers comprehensive and inclusive benefits to meet the diverse needs of our employees and their families throughout their life stages, including:
- Various health plans
- Time off plans for vacation and sick time
- Parental leave options
- Retirement options
- Education reimbursement
- In-office perks, and more!
Learn more about Zscaler’s Future of Work strategy, hybrid working model, and benefits here.
By applying for this role, you adhere to applicable laws, regulations, and Zscaler policies, including those related to security and privacy standards and guidelines.
Zscaler is committed to providing equal employment opportunities to all individuals. We strive to create a workplace where employees are treated with respect and have the chance to succeed. All qualified applicants will be considered for employment without regard to race, color, religion, sex (including pregnancy or related medical conditions), age, national origin, sexual orientation, gender identity or expression, genetic information, disability status, protected veteran status, or any other characteristic protected by federal, state, or local laws. See more information by clicking on the Know Your Rights: Workplace Discrimination is Illegal link.
Pay Transparency
Zscaler complies with all applicable federal, state, and local pay transparency rules.
Zscaler is committed to providing reasonable support (called accommodations or adjustments) in our recruiting processes for candidates who are differently abled, have long term conditions, mental health conditions or sincerely held religious beliefs, or who are neurodivergent or require pregnancy-related support.
Apply for this job
*
indicates a required field
.jpg?1700169058)