Listing Description
Want to hunt those who threaten civilization? Want to catch and expose threats targeting power plants, water, manufacturing systems, and other industrial control systems? Dragos threat intelligence works to discover these threats, develop innovative analytics for detection, support investigations, and incident response, and provide customers with world-class situational awareness. Unlike many other teams with a broader mission, we focus solely on operational threats to industrial control networks; this gives our analysts the time and space necessary to do world-class research and intelligence on the most advanced and significant threats in the world.
At Dragos, we are not traditional intelligence analysts; we are hunters of evil which threatens the functions of civil society. We are dedicated to the idea that intelligence not properly communicated is not intelligence at all. We get excited by the “thrill of the hunt” and support our Threat Operations Center during customer security incidents. If you are as excited about this as us, please let us know!
Dragos is primarily located in Maryland with many analysts working remotely.
REQUIREMENTS
3+ hunting and tracking targeted threats
3+ years’ experience with network-based intrusion analysis
Knowledge of common malware functionality and operations and comfortable working with static and dynamic binary analysis output
2+ years developing analytics to enable threat hunting and detection
Experience pivoting across the Diamond Model and all stages of the kill-chain
Demonstrable experience producing customer-facing intelligence reports with strong writing skills
Experience developing indicators of compromise (IOCs) for customer-facing applications
1+ year working directly with customers to collect requirements and feedback on intelligence products and services
Able to work well with a remote team of collaborators and deliver product on time and within quality guidelines
Comfortable in at least one scripting language (like Python) enabling the analyst to automate their own tasks when necessary
Good research and documentation skills including knowledge of major OSINT sources and their investigatory value
OPTIONAL
Experience with industrial control systems and threats specific to their operational environment
Experience reverse engineering malware with static and/or dynamic tools and techniques
Experience developing YARA, snort, and/or Bro signatures
Experience working with an operations center and/or incident response team
Official posting: https://dragos.com/careers.html#intel
Apply here or contact careers@dragos.comDiscover new threats to industrial control systems
Author customer-ready intelligence reports
Develop situational awareness of threats to industrial control systems
Support industrial control security incident response
Develop detection analytics
Listing Details
- Citizenship: No Requirements
- Incentives: Stock Options
- Education: Bachelors Degree
- Travel: Travel 25
- Telework: Full Telecommute