Malwarebytes began after our founder, Marcin Kleczynski, accidentally infected his parents’ computer while downloading a video game as a teenager. At the time, there was no product that could fully solve the problem, so he set out to build one. That early experience shaped our mission: to create protection that works when people need it most.
About ThreatDown
ThreatDown, the corporate business unit of Malwarebytes, is redefining cybersecurity for growing businesses with solutions that stop ransomware, malware, phishing, and AI-powered attacks. Our platform is trusted, intuitive, and built for lean IT teams that need speed without complexity. At ThreatDown, you’ll join a team driven by innovation, resilience, and a passion for empowering businesses to thrive securely. If you're ready to make a real impact in cybersecurity, we’d love to meet you.
ThreatDown is looking for:
We want somebody with a real passion for defending the cyberworld. You’ll be part of a team providing professional cybersecurity services for Malwarebytes customers, helping to defend and remediate against all manner of cyber threats. It’s more than a job, it’s a mission.
Malwarebytes MDR Analysts detect, contain, and remediate advanced threats to protect our customers. You will be primarily focused on real-time incident detection, validation, remediation, and reporting.
What you'll do
* Support 24/7/365 Managed Detection and Response efforts:
* Monitor and analyze log data and/or alerts generated by Malwarebytes security technologies in real-time; escalate and report validated security incidents to our customers.
* Investigate and validate alerts.
* Handle incidents as defined in playbooks and standard operating procedures and advise our customers on remediation actions.
* Escalate difficult or complex issues to more experienced staff, as appropriate.
* Prepare incident reporting for customers outlining the threat, its characteristics, and possible remediation activities.
* Provide peer review for incident reporting.
* Maintain knowledge of current cyber threat actor tools, techniques, and procedures (TTPs).
* Manage and track customer issues and requests.
* Identify opportunities for process improvement.
* Support the Malwarebytes product development team by providing input to continuously improve our products.
* Partner with cross-functional technical teams to share expertise, research threats, and implement solutions.
* Compile and document observed threat activity for use by Malwarebytes intelligence analysts.
* Handle high pressure situations in a productive and professional manner.
Skills You'll Need to Have
* 2 or more years of related work experience.
* Bachelor's Degree required in Cybersecurity, Computer Engineering, Information Security, Computer Science, or a related technical discipline (or 2+ years of related experience).
* Ability to be self-directed, taking initiative and executing tasks independently.
* Solid knowledge of Windows, MacOS and Linux environments.
* Solid knowledge of IP networking and network security fundamentals, including Intrusion Detection.
* Solid understanding of computer security principles and the cyber security threat landscape, including technical knowledge about the most prevalent vulnerabilities, threats, attack methods, and infection vectors.
* Excellent verbal and written communication skills and collaborative attitude.
* Experience working in a team-oriented, collaborative environment with a high level of analytical and problem-solving abilities.
* Ability to anticipate and respond to changing priorities and operate effectively in a dynamic demand-based environment.
* Strong customer service and interpersonal skills.
* Strong technical and troubleshooting skills.
* Handle high pressure situations in a productive and professional manner.
* Ability to maintain confidentiality with sensitive data.
Nice to Have Skills
* Prior experience working in a SOC or Managed Security Service Provider (MSSP) setting is a plus.
* Experience/Expertise with SOAR tools highly desired.
* Applicable Industry Certifications, such as:
* CompTIA Security+
* GIAC Certified Incident Handler (GCIH)
* GIAC Certified Intrusion Analyst (GCIA)
* Advanced Degree or Academic Certificate in computer security related field.
* Experience and knowledge of public cloud environments, specifically AWS and Azure.
* Strong understanding of network protocols coupled with experience with web proxies, web application firewalls, and vulnerability assessment tools.
* Familiarity with common network vulnerability/penetration testing tools.
Benefits and Perks
* Comprehensive medical, dental, and vision insurance coverage
* Employee Referral Bonus Program
* Wellness programs
* 401k and employer matching for (US Employees)
* An opportunity to do something great for yourself and the world!
(Benefits and Perks subject to change by country/region)
Legal Language:
(US Employees Only)
Applicants have rights under the Federal Employment Laws:
This is to affirm our policy of providing equal employment opportunities to all employees and applicants for employment in accordance with all applicable laws and regulations.
Our company will not discriminate against or harass any employee or applicant for employment because of race, color, creed, religion, national origin, sex, sexual orientation, gender identity, disability, age, marital status, familial status, membership or activity in a local human rights commission, or status regarding public assistance. We will ensure that all our employment practices are free of discrimination. Such employment practices include, but are not limited to, the following: hiring, upgrading, demotion, transfer, recruitment or recruitment advertising, selection, layoff, disciplinary action, termination, rates of pay or other forms of compensation, and selection for training, including apprenticeship. We will provide reasonable accommodation to applicants and employees with disabilities whenever possible.
#J-18808-Ljbffr