Chainlink Labs logo

Cyber Threat Analyst

Chainlink Labs
Full-time
Remote
United States
Software/ IT

The Cyber Threat Analyst is responsible for conducting cyber threat intelligence analysis with a strong technical emphasis on infrastructure pivoting, malware analysis, and detection engineering in alignment with Chainlink Labs’ vision and objectives. The Analyst will play a critical role in proactively identifying, analyzing, and mitigating sophisticated cyber threats, dissecting malware and adversary techniques, conducting technical threat research, and developing detection methodologies to enhance security posture.

Your Impact

  • Proactively track malicious infrastructure, hunt for new malware samples, and adversary tools to identify new adversary tooling, detection opportunities, and mitigation strategies.
  • Create precise detection rules (e.g., YARA, Sigma) and develop custom tools and scripts to identify malicious activity proactively.
  • Conduct deep-dive intelligence analysis and investigations related to suspicious activity and attempted attacks.
  • Serve as an SME for malware reverse engineering, with a focus on ARM binaries.
  • Maintain a working knowledge of adversarial tactics and techniques, and how they are being used to achieve current objectives.
  • Collaborate with and support the investigations of other Cybersecurity Operations and Information Security teams.

Requirements

  • At least two years of experience in cyber threat analysis or threat investigations.
  • Demonstrated a high-level understanding of recent cyber trends, campaigns, incidents, and threat actor groups.
  • Familiarity with Vertex Synapse and its Storm scripting language or experience with similar intelligence analysis tools.
  • Real-life experience in detection engineering, including using SIEMs and writing effective detection rules in YARA or Sigma.
  • Experience using technical data sources like file repositories, passive DNS, or internet service scans for threat research purposes.
  • Understanding of network protocols such as HTTP, DNS, TLS.
  • Prior experience with automated malware sandboxes to analyze malicious samples and identify detection opportunities. Proficiency with reverse engineering tools, such as Binary Ninja and Ghidra.

Preferred Requirements

  • In-depth understanding of threats targeting the blockchain ecosystem, especially in relation to their tools and tradecraft, and how web2 threats affect web3 systems.
  • Proven track record of building and maintaining logging, analysis, or enrichment pipelines, preferred languages include Python, Rust or Golang.
  • Excellent verbal and written communication skills with prior experience in presenting research findings to internal and external stakeholders.
  • Understanding of structured analytic techniques to help mitigate bias in analysis.