AmeXio is a global digital transformation partner for corporate clients and government institutions. We help businesses with their digital growth in the areas of Customer Experience, Enterprise Content, Customer Communication, and Structured Content Management.
At AmeXio, we believe that work should be more than just a job — it should be an adventure. We’re a company that thrives on teamwork, innovation, and most importantly, having fun while we do it. We are always there for each other and safeguard our pleasant and approachable atmosphere. If you are looking for a place where you can develop yourself further and where you are inspired, you have come to the right place!
In this role, you will
- Support junior CTI and SOC analysts in their analysis, especially in case of cases escalation
- Coordinate CTI activities, including infrastructure design, under SOC Lead guidance, including documentation drafting, maintenance and improvement of such documents
- Run daily checks to report relevant findings to other teams, e.g. new vulnerabilities, 0-days, new exploit patterns (IoA – Indicator of Attack), particular IoC (Indicator of Compromise)
- Configure and maintain a TIP (Threat Intel Platform), including observables ingestion, feeds quality assessment and guaranteeing the following qualities for a set of HiFi observables that are pushed to SIEM for alerting: Accurate, Timely, Complete and Industry-focused.
- Contextualize all the above, when context is not enough, to make it actionable for other teams (e.g. mainly for SOC analysis, but also collaborating with engineers to automate such task(s) or with other SOC analysts to tune or develop new Use Cases – Alerts, Reports, Dashboards)
- Summarise and report monthly on all the above to SOC Lead, CISO and customers
- Support SIEM engineers for intel-based events enrichment (e.g. geolocation, carrier context)
Basic qualifications
- Bachelor’s or Master’s degree in Computer Science, Software Engineering, Information Security, or similar technical field;
- 4+ years working within the cybersecurity field, with emphasis on Security Operations and Threat Intelligence;
- Usage, handling and maintenance of a TIP (e.g. Anomali, ThreatConnect, ThreatQ, also MISP), including knowledge of STIX/TAXII standards, F3EAD and MITRE ATT&CK Enterprise models;
- Usage of Splunk as SIEM and thus intermediate SPL query language knowledge and skills;
- Knowledge of one or more programming/scripting language (e.g. Python);
- Passionate about IT and Cybersecurity in particular, with a willingness to stay up to date on hot topics in the field;
- Ability to reasonably balance best practices and problem solving in practical situations, considering stakeholders’ considerations of risks and reasons;
- Fluent in English, both written and verbal.
Preferred qualifications
- One or more of the following certifications:
- SANS/GIAC GOSI “Open Source Intelligence”;
- SANS/GIAC GCTI “Cyber Threat Intelligence”;
- Mossé MTIA “Threat Intelligence Analyst”;
- Splunk Power User;
- Splunk Enterprise Security Admin;
- Previous experience in analysis of Threat Actors, including capability to perform attribution of alerts based on context, as well as performing actor/hypothesis-driven Threat Hunting;
- Fluent in French and/or Italian.