What are the responsibilities and job description for the Senior Information Security Engineer position at Sparagus?
Role
At the heart of our client’s defense against cyber threats lies the Security Operations Center (SOC). The SOC is composed of several specialized teams, each playing a crucial role in protecting the organization:
The CTI team supports not only the SOC but also a wide range of stakeholders across the organization, each relying on CTI insights for their specific domains.
Key Challenges for CTI in the Short to Medium Term
As a Cyber Threat Intelligence Analyst, you will provide intelligence on threats and threat actors, assess the risks they pose to the client’s IT environment, and recommend enhancements to security controls.
You Will
At the heart of our client’s defense against cyber threats lies the Security Operations Center (SOC). The SOC is composed of several specialized teams, each playing a crucial role in protecting the organization:
- Cyber Threat Intelligence (CTI) gathers data on potential threats, contextualizes it within the client’s environment, and delivers actionable insights to support decision-making and trigger new alerts.
- Use Case Design ensures that the infrastructure is equipped with the right triggers to detect potential threats.
- Security Analysts (T1/T2/T3) investigate alerts when they are triggered.
- Cyber Security Incident Response Team (CSIRT) coordinates the response when alerts escalate into full-scale incidents.
The CTI team supports not only the SOC but also a wide range of stakeholders across the organization, each relying on CTI insights for their specific domains.
Key Challenges for CTI in the Short to Medium Term
- Expanding services to existing stakeholders
- Establishing service delivery for new stakeholders
As a Cyber Threat Intelligence Analyst, you will provide intelligence on threats and threat actors, assess the risks they pose to the client’s IT environment, and recommend enhancements to security controls.
You Will
- Conduct research on emerging threats relevant to the client’s environment
- Identify and classify threat actors and campaigns
- Prepare and present CTI reports to the internal cybersecurity community
- Understand the client’s critical IT assets and security controls
- Collaborate on threat hunting and use case development
- Analyze adversary tactics and identify gaps in existing defenses
- Recommend improvements to the security architecture
- Review and interpret external threat intelligence sources and reports
- Suggest enhancements to detection use cases based on internal and external insights
- Liaise with group-level or partner CERT teams to share intelligence and foster collaboration
- Strong knowledge of threat impact assessment techniques
- Experience supporting use case design and correlation rule development
- Familiarity with log management and SIEM tools
- Proficiency with commercial and open-source security tools (e.g., EPP, EDR, SIEM)
- Skilled in log analysis using regular expressions and natural language queries
- Understanding of network traffic analysis and packet capture
- Solid grasp of encryption and cryptography
- Familiarity with frameworks such as MITRE ATT&CK, Kill Chain, or the Diamond Model is a strong plus