Proofpoint Logo

Proofpoint

Senior Cybersecurity Analyst

Posted 5 Hours Ago
Be an Early Applicant
Remote
2 Locations
Senior level
Remote
2 Locations
Senior level
Analyze email logs and large datasets to detect and respond to phishing, malware, BEC, and spam; build detection rules/signatures; develop/maintain Python tools; perform content development and signature tuning; participate in on-call rotations and cross-functional product discussions.
The summary above was generated by AI

About Us:

 

Proofpoint is a global leader in human- and agent-centric cybersecurity. We protect how people, data, and AI agents connect across email, cloud, and collaboration tools. Over 80 of the Fortune 100, 10,000 large enterprises, and millions of smaller organizations trust Proofpoint to stop threats, prevent data loss, and build resilience across their people and AI workflows. Our mission is simple: safeguard the digital world and empower people to work securely and confidently. Join us in our pursuit to defend data and protect people.

How We Work:

At Proofpoint you’ll be part of a global team that breaks barriers to redefine cybersecurity guided by our BRAVE core values: 

Bold in how we dream and innovate

Responsive to feedback, challenges and opportunities

Accountable for results and best in class outcomes

Visionary in future focused problem-solving

Exceptional in execution and impact

The Role

You are a Senior CyberSecurity Analyst  (email borne threats) or have a strong desire and a skill set to become one!

We are looking for a highly intelligent, analytical, driven person to join a dynamic group of people who are passionate about saving the world from the growing threat of e-mail borne threats: phishing, malware , BEC and spam. We are competing against a very active, creative, and motivated adversary who was credited as sending over 40 trillion spam/threat email messages last year alone! If you are interested in helping us achieve our goal and rid the world of phishing, malware and spam, we definitely would like to speak with you. We offer a challenging environment that fosters creativity and rewards excellence.

               

Your day to day                                         

  • Member of a creative, enthusiastic, and geographically distributed team (in a 24/7/365 "follow the sun" model) that is responsible for identifying, parameterizing, and responding quickly to spam attacks levied against some of the world's largest organizations.

  • Analyze data and logs, search for specific patterns to identify email accounts take over, suspicious Ips, IP ranges, sending domains, etc, etc

  • Find suspicious behavioral patterns and identify/fix FNs/FPs

  • Analyze email messages reported by customers as well as work on large data sets in order to determine correct classification (spam, phishing, malware, BEC (Advanced Email Fraud), bulk, ham).

  • Some CONTENT DEVELOPMENT.  Perform deep analyses of spam message headers & structures to identify novel spam features, and design various rules/signatures to detect those features and block email borne threats

  • Ad-hoc development of tools as necessary to aid/streamline analysis activities is a plus

  • As an Email Cybersecurity analyst, who has coding experience and skills - an opportunity to design and develop new PoCs  threat detection system(s) based on your expertise or learn how to add this skill to your toolset.

  • Developing and maintaining Python applications/tools, writing clean and efficient code, debugging and troubleshooting issues, collaborating with cross-functional teams, and participating in code reviews is a plus

  •  Knowledge of database systems is a plus

  • Be available in an rotating on-call basis to respond to develop signatures, that detect and block an emerging or an ongoing threat(s)

  • Help us define the landscape, prevalence, and evolution of messaging abuse, threats, and attacks by participating in future requirements definition discussions of our products.

What you bring to the team

  • Deep knowledge of IP space

  • Deep knowledge of Domain space

  • Knowledge of different types of email borne attack vectors, tools and tactics  

  • Solid SQL, Presto SQL skills – proven experience in query building is a must

  • In-depth knowledge of email borne threats: phishing, malware, BEC and spam. Ability to find and research suspicious patterns in sending Ips, URLs, domains, in conjunction with overall email structure (email headers and email context). 

  • Ability to create detection signatures/rules  (content development) based on observed suspicious patterns with experience of 2-4 or more years in the field.                   

  • General curiosity about the headers and structure of email messages.               

  • General familiarity with how mail delivery works, knowledge of email security standards and protocols, such as SPF, DKIM, and DMARC, would be beneficial.

  • Practical knowledge (hands-on experience) with Regular Expressions                                               

  • Minimum 2+ years hands-on experience with Python or a different programming language is a plus

  • Experience in one of Python frameworks (Django, Flask or Pandas) is a plus

  • Experience with data analysis, familiarity with cybersecurity best practices, and the ability to work with large datasets.

  • Familiarity with Unix environments and comfort with a range of Unix command line tools for manipulating and extracting content from text files is a must have

  • Familiarity and/or experience with LUA based detection signatures is a plus

  • Familiarity and/or experience with ClamAV and/or Yara and/or in-house developed framework allowing to research and create signature based detection on email borne threats based detection signatures is a plus

  • Willingness to play an important technical role

  • Demonstrated analytical and creative problem-solving abilities.          

  • Ability to work independently yet fully integrate with worldwide, remote teams.            

  • Can-do attitude with a focus on problem solving, product quality, and a strong desire to get the job done.              

  • Requirements/Education and/or Equivalent Experience (including technical and non-technical capabilities)            

  • BSCS or equivalent, or equivalent technical experience.   

#LI-PH1

Why Proofpoint?

At Proofpoint, we believe that an exceptional career experience includes a comprehensive compensation and benefits package. Here are just a few reasons you’ll love working with us:

  • Competitive compensation

  • Comprehensive benefits

  • Career success on your terms

  • Flexible work environment

  • Annual wellness and community outreach days

  • Always on recognition for your contributions

  • Global collaboration and networking opportunities

 

Our Culture:

Our culture is rooted in values that inspire belonging, empower purpose and drive success-every day, for everyone.

We encourage applications from individuals of all backgrounds, experiences, and perspectives. If you need accommodation during the application or interview process, please reach out to [email protected].


How to Apply

Interested? Submit your application along with any supporting information- we can’t wait to hear from you!

Top Skills

Python,Sql,Presto Sql,Django,Flask,Pandas,Regular Expressions,Spf,Dkim,Dmarc,Unix Command Line,Lua,Clamav,Yara,Databases

Similar Jobs

5 Hours Ago
Remote
2 Locations
Senior level
Senior level
Security • Cybersecurity
Investigate and triage email-borne threats (phishing, malware, BEC, spam); analyze logs and large datasets; create detection signatures/rules; develop/maintain Python tools; perform content development and on-call response to emerging attacks.
Top Skills: Python,Sql,Presto Sql,Django,Flask,Pandas,Regular Expressions,Unix Command Line Tools,Lua,Clamav,Yara,Spf,Dkim,Dmarc,Database Systems
An Hour Ago
Easy Apply
Remote
India
Easy Apply
Mid level
Mid level
Artificial Intelligence • Fintech • Hardware • Information Technology • Sales • Software • Transportation
Work directly with customers to design, build, test, and deploy integrations using Java and middleware (Mulesoft/Workato/Boomi). Lead B2B EDI onboarding, map EDI to APIs/JSON/XML, configure secure transports (AS2/SFTP/VANs), and share best practices across teams while identifying upsell opportunities.
Top Skills: Java,Mulesoft,Workato,Boomi,Mulesoft Anypoint B2B,Boomi Edi,Edi,Ansi X12,Edifact,Json,Xml,Apis,As2,Sftp,Vans,Oauth,Saml,Single Sign On,Agile Scrum,Enterprise Saas,Public Cloud
5 Hours Ago
Remote or Hybrid
Bengaluru, Karnataka, IND
Mid level
Mid level
Artificial Intelligence • Big Data • Cloud • Information Technology • Machine Learning • Software
Design, build, and deliver large-scale cloud-native microservices to process billions of events. Collaborate with product and engineering teams, drive reliability, performance, CI/CD, testing, and handle L3 support while participating in agile ceremonies.
Top Skills: Java,Microservices,Micronaut,Kafka,Aws,Docker,Kubernetes,Reactjs,Ci/Cd

What you need to know about the Chennai Tech Scene

To locals, it's no secret that South India is leading the charge in big data infrastructure. While the environmental impact of data centers has long been a concern, emerging hubs like Chennai are favored by companies seeking ready access to renewable energy resources, which provide more sustainable and cost-effective solutions. As a result, Chennai, along with neighboring Bengaluru and Hyderabad, is poised for significant growth, with a projected 65 percent increase in data center capacity over the next decade.

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account