Job Openings Threat Operations Analyst

About the job Threat Operations Analyst

Threat and Vulnerability Analysis

  • Review and analyse threats, risks, and vulnerabilities surfaced by the
  • Research Team and cyber detection pipelines.
  • Validate the presence of exposed services (e.g., RDP, SSH, databases, edge devices) using platforms such as Shodan, Censys, LeakIX, and Nuclei scans.
  • Evaluate security configurations to determine whether mitigating controls or compensating measures are in place.

Asset Verification and Attribution

  • Confirm internet-facing asset ownership using WHOIS, DNS lookups, reverse- DNS checks, TLS fingerprinting, Shodan datasets, and related OSINT techniques.
  • Resolve attribution uncertainties, ensuring customers only receive notifications for confirmed assets.

Customer Notification and Advisory Work

  • Produce clear and concise security alerts, including explanations of the issue, affected assets, recommended remediation steps, and references to vendor guidance.
  • Communicate directly with customers and brokers to explain findings, clarify risks, and guide remediation priorities where necessary.

Internal Collaboration and Escalation

  • Act as a technical escalation point for Customer Support, Underwriting, and Claims teams.
  • Investigate inbound queries relating to exposed services, flagged vulnerabilities, potential false positives, or disputed asset ownership.
  • Contribute technical insight to improve internal processes, detection workflows, and knowledge sharing across teams.

Operational Excellence

  • Maintain a high standard of customer service, ensuring communications are professional, timely, and approachable.
  • Assist in tuning detection logic and improving the accuracy of vulnerability and exposure matching.
  • Support the continuous improvement of intelligence capabilities and processes.

Required Skills and Knowledge

  • 5 + years experience
  • Strong understanding of networking fundamentals (TCP/IP, ports, protocols, common services).
  • Familiarity with cyber security terminology (CVE, CVSS, threat actor TTPs, exploitation lifecycle, attack surface concepts).
  • Hands-on experience using internet scanning or exposure assessment tools (e.g., Shodan, Censys, LeakIX, Nuclei).
  • Ability to interpret DNS records, WHOIS data, HTTP response headers, and other OSINT artefacts.
  • Able to break down complex technical issues into clear, customer-friendly language.
  • Proven track record in an MSSP, SOC, threat monitoring or security operations role.
  • Experience triaging or validating vulnerabilities, exposures, misconfigurations, or security alerts.

Certifications (Desired but Not Essential)

  • CompTIA Security+ (or equivalent vendor-neutral foundational certifications).
  • Other relevant certifications (e.g., Network+, CySA+, GIAC, eLearnSecurity, or similar) welcomed.