Description
Malwarebytes believes that when people and organizations are free from threats, they are free to thrive. Founded in 2008, CEO Marcin Kleczynski had one mission: to rid the world of malware. Today, Malwarebytes has grown beyond malware remediation to ensuring cyber protection for everyone, providing device protection, privacy, and prevention solutions in the home, on-the-go, at work, or on campus. With threat hunters and innovators across the world, we want great people, like YOU, to join our team!
Malwarebytes is looking for...
We want somebody with a real passion for defending the cyberworld. You’ll be part of a team providing professional cybersecurity services for Malwarebytes customers, helping to defend and remediate against all manner of cyber threats. It’s more than a job, it’s a mission.
Malwarebytes Associate MDR Analysts detect, contain, and remediate advanced threats to protect our customers. You will be primarily focused on real-time incident detection, validation, remediation, and reporting.
This position is open to remote candidates based in Portugal.
What You’ll Do:
1. Support 24/7/365 Managed Detection and Response efforts:Monitor and analyze log data and/or alerts generated by Malwarebytes security technologies in real-time; escalate and report validated security incidents to our customers.Investigate and validate alerts.Handle incidents as defined in playbooks and standard operating procedures and advise our customers on remediation actions.Escalate difficult or complex issues to more experienced staff, as appropriate.Prepare incident reporting for customers outlining the threat, its characteristics, and possible remediation activities.Provide peer review for incident reporting.
2. Maintain knowledge of current cyber threat actor tools, techniques, and procedures (TTPs).
3. Manage and track customer issues and requests.
4. Identify opportunities for process improvement.
5. Support the Malwarebytes product development team by providing input to continuously improve our products.
6. Partner with cross-functional technical teams to share expertise, research threats, and implement solutions.
7. Compile and document observed threat activity for use by Malwarebytes intelligence analysts.
8. Handle high pressure situations in a productive and professional manner.
Skills You’ll Need to Have:
9. Ability to work overnight shift: ORANGE SHIFT /// Wednesday through Saturday (4 days of 10 hours) /// 3:00 AM to 1:00 PM local
10. 1 or more years of related work experience.
11. Bachelor's Degree required in Cybersecurity, Computer Engineering, Information Security, Computer Science, or a related technical discipline (or 2+ years of related experience).
12. Ability to be self-directed, taking initiative and executing tasks independently.
13. Solid knowledge of Windows, MacOS and Linux environments.
14. Solid knowledge of IP networking and network security fundamentals, including Intrusion Detection.
15. Solid understanding of computer security principles and the cyber security threat landscape, including technical knowledge about the most prevalent vulnerabilities, threats, attack methods, and infection vectors.
16. Excellent verbal and written communication skills and collaborative attitude.
17. Experience working in a team-oriented, collaborative environment with a high level of analytical and problem-solving abilities.
18. Ability to anticipate and respond to changing priorities and operate effectively in a dynamic demand-based environment.
19. Strong customer service and interpersonal skills.
20. Strong technical and troubleshooting skills.
21. Handle high pressure situations in a productive and professional manner.
22. Ability to maintain confidentiality with sensitive data.
23. Must be willing to work weekends or holidays when scheduled.
Nice to have skills:
24. Prior experience working in a SOC or Managed Security Service Provider (MSSP) setting is a plus.
25. Past work experience in a similar role.
26. Experience/Expertise with SOAR tools highly desired.
27. Applicable Industry Certifications, such as:CompTIA Security+GIAC Certified Incident Handler (GCIH)GIAC Certified Intrusion Analyst (GCIA)
28. Advanced Degree or Academic Certificate in computer security related field.
29. Endpoint detection product experience.
30. Experience and knowledge of public cloud environments, specifically AWS and Azure.
31. Strong understanding of network protocols coupled with experience with web proxies, web application firewalls, and vulnerability assessment tools.
32. Familiarity with common network vulnerability/penetration testing tools.
Benefits and Perks:
33. An opportunity to do something great for yourself and the world
34. A great work environment that supports growth, development, and most importantly having fun!
35. Competitive salary
36. Meal Allowance
37. Private Healthcare Coverage
38. Employee Referral Bonus Program
39. Wellness programs
#LI-REMOTE