Join Us Shape the future of cybersecurity Boost your career Work hard, play hard
We are here to give every company peace of mind with the knowledge and tools they need to protect their company and customers.
Superheroes don’t need capes
We protect our customers with unwavering commitment.
We dare. We collaborate. We excel.
We seek team players.
We break barriers and make impact, together.
Apply for one of our positions. Be part of something big.
IR And Malware Analyst
About The Position
About Us
CYREBRO is revolutionizing business cybersecurity with the first interactive SOC (Security Operations Center) Platform. Our cutting-edge infrastructure transforms how businesses of all sizes respond to and mitigate cyber threats.
By centralizing security operations, the CYREBRO platform delivers unparalleled clarity, insight, and real-time cyber recommendations, seamlessly integrating all security events into a single command center.
Responsibilities
What You’ll Do
· Conduct digital forensics analysis on diverse evidence types including disk, memory, network, and cloud artifacts.
· Lead incident response initiatives to effectively contain, mitigate, and guide recovery efforts for security breaches.
· Work closely with the SOC team to validate, escalate, and address identified threats.
· Stay abreast of emerging threats, attack vectors, threat actors, and advancements in security technologies.
· Develop and deploy detection rules, leveraging MDR solutions to identify and manage new threats.
· Enhance the SOC team's DFIR capabilities by creating and refining tools, scripts, correlation alerts, and automation.
· Keep up to date with industry trends and research to continuously strengthen our security posture.
· Partner with cross-functional teams to provide actionable insights and comprehensive incident reports.
Requirements
What You’ll Need
· 2-3 years of experience in digital forensics and incident response within a SOC environment.
· Proficiency with industry-standard forensic tools and platforms.
· Hands-on experience with threat hunting tools and query languages/platforms such as ELK, Splunk, QRadar, KQL, SQL, etc.
· Exceptional communication and interpersonal skills.
· Fluency in English, both written and spoken, is essential.
· A curious and innovative mindset with a strong passion for learning and tackling complex problems.
· Proven problem-solving skills with the ability to perform effectively under pressure.
· Capability to work both independently and collaboratively in a fast-paced, dynamic setting.
· Experience in scripting with Python, PowerShell, C, or C#.
What You’ll Bring – Advantage
· Knowledge of cloud services, Kubernetes, cloud architecture, and major cloud platforms (AWS, GCP, Azure).
· Experience in malware analysis and reverse engineering.
· Understanding of prominent threat actors and expertise in threat intelligence analysis.
· Familiarity with MDR solutions like SentinelOne and CrowdStrike.
· Relevant certifications (e.g., GCFE, GCFA, GCFR, GCTD, GCTI).
Apply Now
Our Values
-
Integrity
Expertise with
uncompromising
authenticity -
Democratizing cybersecurity
Sharing the knowledge & tools
to protect companies -
Accountability
We initiate with commitment and
implement tenacity -
Customer fixation
Caring for your interests
as if your business
is our own
-
Integrity
Expertise with
uncompromising
authenticity -
Democratizing cybersecurity
Sharing the knowledge & tools
to protect companies -
Accountability
We initiate with commitment and
implement tenacity -
Customer fixation
Caring for your interests
as if your business
is our own
We believe in…
Impact
Every decision, algorithm, process and action are prioritized and measured by its value for our customers
The Hack
Offensive expertise and experience are only possible with obsessively creative, comfort-defying innovation
Intuition
Results are optimized when the technologies, tools, and communication we use simply make sense