About the company
The @wallet Telegram bot is one of the most popular wallets in the TON ecosystem, which you can use to buy, exchange, and send crypto. Wallet provides easier entry to the crypto market than other popular services. We are connecting a messenger that has hundreds of millions of users with the ability to use cryptocurrency for purchases, transfers, and payments. Our audience exceeds 1 million users and continues to grow. Our team unites specialists with FinTech and blockchain expertise. Together, we want to change the perception of crypto assets usage and imp
Job Summary
Responsibilities:
đContinuously monitor and analyze security alerts and logs through our Security Information and Event Management (SIEM) platform, endpoint monitoring solutions, and other security tools to identify potential security incidents. đDevelop and fine-tune SIEM rules and alerts to enhance threat detection capabilities. đCollect, analyze, and disseminate threat intelligence from various internal and external sources to anticipate and prevent security incidents. đPerform detailed analysis of complex security threats, including malware, phishing, and advanced persistent threats (APTs), to determine root causes and potential impacts. đPrepare and present threat intelligence reports to stakeholders and senior management, providing actionable insights to guide decision-making. đCollaborate with other security team members to prioritize and address long-term security issues. đDevelop and implement automated reporting capabilities to keep teams informed of security issues and impacts in real-time. đConduct regular security audits and compliance checks to ensure alignment with industry standards and regulatory requirements. đCoordinate response activities for confirmed incidents, recommending and implementing remedial actions. đStay up-to-date on the latest security trends, emerging threats, and best practices in threat intelligence analysis.
Requirements:
đ3+ years of experience in a threat intelligence analyst role or a similar position within a Security Operations Center (SOC). đ2+ years of hands-on experience with security tools such as SIEM, IPS/IDS, XDR, and endpoint protection solutions. đExtensive knowledge of threat intelligence methodologies, including the collection, analysis, and dissemination of actionable intelligence. đStrong understanding of networks and operating systems (Windows, Linux, or Mac OS X) to effectively analyze and respond to security threats. đExperience with Security Orchestration, Automation, and Response (SOAR) tools and principles. đStrong understanding of cloud security principles and best practices, with at least 1 year of experience working with Cloud Service Providers (AWS, GCP, Azure).