Wallet is hiring a
Web3 SOC Threat Intelligence Lead

Compensation: $105k - $180k estimated

Location: Remote

Wallet in Telegram is your gateway to the world of digital currencies, specially tailored for individuals in emerging markets. We understand the complexities and intimidation often associated with existing crypto solutions, which is why we've designed the Wallet to be the ultimate user-friendly platform for managing finances. No need to open a traditional bank account or wrestle with convoluted crypto exchanges and wallets.

Leveraging the power of advanced blockchain technology, Wallet delivers a seamless onboarding experience into the crypto ecosystem. It enables users to effortlessly store, send, and receive digital currencies, all via the familiar interface of Telegram. Managing your finances becomes as simple as sending a message.

At Wallet, we're committed to using technology to disrupt traditional banking systems, providing our customers with more flexible and inclusive financial services. Whether you're a crypto novice or seeking to simplify your digital finance experience, Wallet is crafted with your needs in mind.

We are looking for a SOC Threat Intelligence Lead to join our Security Operations Center team.

In this role, you will not only monitor, analyze, and respond to emerging security threats, but also lead a team of threat intelligence analysts and develop strategic initiatives to strengthen our organization’s security posture.

The ideal candidate will be proficient in threat intelligence strategies, have in-depth experience in threat analysis, and be able to effectively coordinate with cross-functional teams to proactively mitigate risks.

Responsibilities:

  • Lead and mentor a team of threat intelligence analysts, ensuring continuous skill development and performance improvement.
  • Develop and implement a strategic threat intelligence program aligned with the organization’s overall security goals.
  • Collaborate with senior management and other departments to establish priorities and drive a unified security strategy.
  • Continuously monitor and analyze security alerts and logs via our SIEM platform, endpoint monitoring solutions, and other security tools to identify potential security incidents.
  • Develop and fine-tune SIEM rules and alerts to enhance threat detection capabilities.
  • Collect, analyze, and disseminate threat intelligence from various internal and external sources to anticipate and prevent security incidents.
  • Develop and implement automated reporting capabilities to ensure that teams are informed in real-time about security issues and impacts.
  • Coordinate response activities for confirmed incidents, recommending and implementing remedial actions.
  • Conduct regular security audits and compliance checks to ensure alignment with industry standards and regulatory requirements.

Requirements:

  • 4+ years of experience in a threat intelligence role or a similar position within a Security Operations Center (SOC), with proven experience in team leadership or project management.
  • 3+ years of hands-on experience with security tools such as SIEM, IPS/IDS, XDR, and endpoint protection solutions.
  • Extensive knowledge of threat intelligence methodologies, including the collection, analysis, and dissemination of actionable intelligence.
  • Strong understanding of networks and operating systems (Windows, Linux, or Mac OS X) to effectively analyze and respond to security threats.
  • Experience with Security Orchestration, Automation, and Response (SOAR) tools and principles.
  • Strong understanding of cloud security principles and best practices, with at least 1 year of experience working with Cloud Service Providers (for example, AWS).
  • Basic knowledge of modern programming languages such as Python, with the ability to read and analyze code efficiently (experience with personal or open-source projects is a plus).
  • Demonstrated analytical and problem-solving skills, with a focus on threat analysis and incident response.
  • Excellent communication and documentation skills, capable of presenting complex threat intelligence to both technical and non-technical stakeholders.
  • Excellent communication and documentation skills, capable of presenting complex threat intelligence to both technical and non-technical stakeholders.

Why it is a fantastic opportunity:

  • Our business is growing at an exponential scale.
  • Work in a well-funded startup environment with unique growth opportunities and a chance to join a rapidly growing company with a unique product.
  • Be based remotely.
  • Participation in the performance review and bonus programme.
  • Compensation for medical expenses.
  • Provision of necessary equipment.
  • Annual vacation of 20 working days plus 10 paid days off.
  • 14 days of paid sick leave to support your health and recovery when needed.
  • Access to internal English courses for continuous learning and improvement in language skills.

Apply Now:

Compensation: $105k - $180k estimated

Location: Remote


Receive similar jobs:

Remote

Cover Letter / AI Interview