- Early StageStartup in initial stages
Threat Intel Analyst
- ₹5L – ₹6L • 0.1% – 0.2%
- No experience required
- Full Time
Not Available
In office - WFH flexibility
About the job
About the Company
At FourCore, our mission is to democratize Offensive Security. We are building a cutting-edge Threat Emulation Platform to improve the security posture of organizations with cyber-attack simulations. We are young and passionate people driven by a common goal of fixing security flaws before they become nightmares. We are always searching for great, talented minds to join our team. Your work will safeguard some of the biggest names globally, and you will learn from other talented individuals in our group. Your domain understanding is your primary qualification, not your degree or certifications.
We're hiring a Threat Intel Analyst to join our team @ FourCore. As a Threat Intel Analyst, you will work with the founding team on dissecting TTPs and Threat Intel Reports, track cyber threat actors and their evolution, produce up to date threat intelligence for security teams using FourCore ATTACK and apply the MITRE ATT&CK Framework to map cyber threats.
💫 About the Role
You are someone with prior experiences of:
- Dissecting Threat Intel Reports and Threat Severity
- Analysing and emulating new and upcoming threats
- MITRE ATT&CK Framework
- Tracking Threat Actors and their evolution
- SOC, Log Sources, and Threat Detection Opportunities
🔍 Responsibilities
- Analyze and interpret threat intelligence to identify and track APT groups, attack patterns, and zero-day vulnerabilities.
- Perform in-depth malware analysis (static & dynamic) and reverse engineering.
- Develop and maintain Command & Control (C2) frameworks for emulation and testing.
- Build and tune detection rules across SIEMs and EDR platforms.
- Collaborate with red and blue teams to improve detection and response capabilities.
🖥️ Your everyday work will look like
- Keeping Track of New Threat Actors, and dissecting their TTPs for our Threat Library
- Putting together Detailed Writeups and Public Information on these threats
- Collecting malicious payloads and exploit codes which are being used in the wild
- Creation of New Threat Simulations involving upcoming Threats
- Guiding and providing Subject matter expertise to other Team members
💡 What We're Looking For
- Experience in malware reverse engineering and C2 development.
- Strong understanding of TTPs (Tactics, Techniques, and Procedures) and MITRE ATT&CK framework.
- Expertise in Python, C/C++, or PowerShell for automation and tool development.
- Familiarity with threat hunting, forensic analysis, and network traffic analysis.
- Passion for solving complex security challenges and staying ahead of emerging threats.
💯 You are a Great Fit if
- You have played CTFs and actively solved challenges in related categories
- You have blogs/projects/talks in related categories
- You have Threat Hunting Experience
- You have Malware Reverse Engineering Experience
- You are already part of variety of underground forums and telegram channels
⭐ You are a perfect fit if
- You like writing tools and automating stuff
- You have programming experience across multiple languages including Golang
- You can present and articulate technical information
- You are self driven, can work independently, and are passionate about your area of expertise
- You have strong problem solving, troubleshooting, and analysis skills
About the company
FourCore
- Early StageStartup in initial stages