We are looking for a Threat Detection Analyst to join our team and collaborate 100% on the cybersecurity program of one of our top global clients in the pharmaceutical sector.
In this role you will analyze detect and mitigate cyber threats targeting large-scale enterprise environments. You will design and implement advanced detection mechanisms to proactively identify malicious activities across on-premise cloud and hybrid infrastructuresensuring robust protection for a highly regulated and mission-critical global ecosystem.
Youll work closely with Threat Intelligence Security Operations and Incident Response teams to stay ahead of the evolving threat landscape and strengthen the overall security posture of our pharma client.
Key Responsibilities
- Develop refine and maintain advanced detection rules (including Microsoft XDR).
- Monitor analyze and validate security alerts logs and behavioral anomalies.
- Research emerging threats techniques and TTPs to enhance detection coverage.
- Tune and optimize existing detection logic to reduce false positives and increase visibility.
- Build automated workflows and integrations using APIs and scripting languages.
- Collaborate with Threat Intelligence SOC IR IT and Risk Management teams.
- Document detection logic analysis steps and findings for technical and non-technical audiences.
Requirements
Technical Requirements
- Over 3-5 years of experience in cybersecurity roles such as Threat Hunter Detection Engineer or Threat Analyst.
- Strong background with EDR solutions (SentinelOne CrowdStrike FortiEDR Defender for Endpoint).
- Knowledge of behavioral analytics and anomaly detection methodologies.
- Experience with MITRE ATT&CK D3FEND and other threat intelligence frameworks.
- Scripting in Python PowerShell or Bash for automation and tooling development.
- Hands-on experience integrating tools and workflows using APIs.
- Strong understanding of cloud and network security firewalls IDS/IPS and packet analysis.
- Advanced knowledge of Windows and Linux internals log analysis and common attack vectors.
- Familiarity with tools such as Zeek Falco OSQuery Wireshark and malware analysis techniques.
Soft Skills & Competencies
- Strong communication skills for documenting detection logic and presenting findings clearly.
- Excellent analytical thinking and problem-solving abilities in complex threat scenarios.
- High attention to detail when creating and tuning detections.
- Adaptability and continuous learning mindset to keep up with evolving threats and technologies.
- Effective collaboration with cross-functional cybersecurity and IT teams.
English: High level required.
Hybrid model: Onsite presence in Sant Cugat once per month.
We are looking for a Threat Detection Analyst to join our team and collaborate 100% on the cybersecurity program of one of our top global clients in the pharmaceutical sector.In this role you will analyze detect and mitigate cyber threats targeting large-scale enterprise environments. You will desig...
We are looking for a Threat Detection Analyst to join our team and collaborate 100% on the cybersecurity program of one of our top global clients in the pharmaceutical sector.
In this role you will analyze detect and mitigate cyber threats targeting large-scale enterprise environments. You will design and implement advanced detection mechanisms to proactively identify malicious activities across on-premise cloud and hybrid infrastructuresensuring robust protection for a highly regulated and mission-critical global ecosystem.
Youll work closely with Threat Intelligence Security Operations and Incident Response teams to stay ahead of the evolving threat landscape and strengthen the overall security posture of our pharma client.
Key Responsibilities
- Develop refine and maintain advanced detection rules (including Microsoft XDR).
- Monitor analyze and validate security alerts logs and behavioral anomalies.
- Research emerging threats techniques and TTPs to enhance detection coverage.
- Tune and optimize existing detection logic to reduce false positives and increase visibility.
- Build automated workflows and integrations using APIs and scripting languages.
- Collaborate with Threat Intelligence SOC IR IT and Risk Management teams.
- Document detection logic analysis steps and findings for technical and non-technical audiences.
Requirements
Technical Requirements
- Over 3-5 years of experience in cybersecurity roles such as Threat Hunter Detection Engineer or Threat Analyst.
- Strong background with EDR solutions (SentinelOne CrowdStrike FortiEDR Defender for Endpoint).
- Knowledge of behavioral analytics and anomaly detection methodologies.
- Experience with MITRE ATT&CK D3FEND and other threat intelligence frameworks.
- Scripting in Python PowerShell or Bash for automation and tooling development.
- Hands-on experience integrating tools and workflows using APIs.
- Strong understanding of cloud and network security firewalls IDS/IPS and packet analysis.
- Advanced knowledge of Windows and Linux internals log analysis and common attack vectors.
- Familiarity with tools such as Zeek Falco OSQuery Wireshark and malware analysis techniques.
Soft Skills & Competencies
- Strong communication skills for documenting detection logic and presenting findings clearly.
- Excellent analytical thinking and problem-solving abilities in complex threat scenarios.
- High attention to detail when creating and tuning detections.
- Adaptability and continuous learning mindset to keep up with evolving threats and technologies.
- Effective collaboration with cross-functional cybersecurity and IT teams.
English: High level required.
Hybrid model: Onsite presence in Sant Cugat once per month.
View more
View less