About the company
The @wallet Telegram bot is one of the most popular wallets in the TON ecosystem, which you can use to buy, exchange, and send crypto. Wallet provides easier entry to the crypto market than other popular services. We are connecting a messenger that has hundreds of millions of users with the ability to use cryptocurrency for purchases, transfers, and payments. Our audience exceeds 1 million users and continues to grow. Our team unites specialists with FinTech and blockchain expertise. Together, we want to change the perception of crypto assets usage and imp
Job Summary
Responsibilities:
šContinuously monitor and analyze security alerts and logs through our Security Information and Event Management (SIEM) platform, endpoint monitoring solutions, and other security tools to identify potential security incidents. šDevelop and fine-tune SIEM rules and alerts to enhance threat detection capabilities. šCollect, analyze, and disseminate threat intelligence from various internal and external sources to anticipate and prevent security incidents. šPerform detailed analysis of complex security threats, including malware, phishing, and advanced persistent threats (APTs), to determine root causes and potential impacts. šPrepare and present threat intelligence reports to stakeholders and senior management, providing actionable insights to guide decision-making. šCollaborate with other security team members to prioritize and address long-term security issues. šDevelop and implement automated reporting capabilities to keep teams informed of security issues and impacts in real-time. šConduct regular security audits and compliance checks to ensure alignment with industry standards and regulatory requirements. šCoordinate response activities for confirmed incidents, recommending and implementing remedial actions. šStay up-to-date on the latest security trends, emerging threats, and best practices in threat intelligence analysis.
Requirements:
š3+ years of experience in a threat intelligence analyst role or a similar position within a Security Operations Center (SOC). š2+ years of hands-on experience with security tools such as SIEM, IPS/IDS, XDR, and endpoint protection solutions. šExtensive knowledge of threat intelligence methodologies, including the collection, analysis, and dissemination of actionable intelligence. šStrong understanding of networks and operating systems (Windows, Linux, or Mac OS X) to effectively analyze and respond to security threats. šExperience with Security Orchestration, Automation, and Response (SOAR) tools and principles. šStrong understanding of cloud security principles and best practices, with at least 1 year of experience working with Cloud Service Providers (AWS, GCP, Azure).