At SAFE Security, our mission is bold and ambitious: We Will Build CyberAGI — a super-specialized system of intelligence that autonomously predicts, detects, and remediates threats. This isn’t just a vision—it’s the future we’re building every day, with the best minds in AI, cybersecurity, and risk. At SAFE, we empower individuals and teams with the freedom and responsibility to align their goals, ensuring we all move towards this goal together. We operate with radical transparency, autonomy, and accountability—there’s no room for brilliant jerks. We embrace a culture-first approach, offering an unlimited vacation policy, a high-trust work environment, and a commitment to continuous learning. For us, Culture is Our Strategy—check out our Culture Memo to dive deeper into what makes SAFE unique._ ### Core Responsibilities: * Collaborate with the Threat Research team to perform daily analysis, enrichment, and contextualization of Threat Events. * Ingest enriched Threat Events into the Threat Intelligence Exchange platform for operational and strategic use. * Monitor and analyse threat actor campaigns to identify targeted industries, initial access techniques, and observed impact or outcomes. * Map threat actor tactics, techniques, and procedures (TTPs) to the MITRE ATT&CK framework and correlate with FAIR CAM (Controls Analytics Model) for control effectiveness evaluation. * Using the ATT&CK framework and the SAFE controls library, research both historical and emerging security breaches to identify attacker behaviours and associated mitigations. * Conduct continuous research on evolving cyber threat trends, novel attack vectors, and vulnerabilities using open-source threat feeds, advisories, and commercial intelligence platforms. * Collaborate closely with internal stakeholders, including Threat Research and Program Management. ### Essential Skills/ Qualifications/ Experience: * Bachelor's or Master’s degree in Computer Science, Information Technology, Cybersecurity, or a related field (B.Tech / M.Tech / BCA). * Hands-on experience with threat intelligence platforms (TIPs) and threat hunting methodologies. * Proven experience in tracking and profiling threat actors, including monitoring dark web forums, leak sites, and underground marketplaces. * Familiarity with source code repositories is a plus. * Proficient in scripting languages such as Python, Shell scripting, or JavaScript for automating intelligence gathering and enrichment tasks. * Ability to work independently with minimal supervision in a fast-paced, research-driven environment. * Excellent analytical, written, and verbal communication skills for documenting and presenting findings to technical and non-technical stakeholders. If you’re passionate about cyber risk, thrive in a fast-paced environment, and want to be part of a team that’s redefining security—we want to hear from you! 🚀 We may use artificial intelligence (AI) tools to support parts of the hiring process, such as reviewing applications, analyzing resumes, or assessing responses. These tools assist our recruitment team but do not replace human judgment. Final hiring decisions are ultimately made by humans. If you would like more information about how your data is processed, please contact us.