Threat Analyst

PhishMe   •  

Birmingham, AL

Industry: Business Services


Less than 5 years

Posted 355 days ago


  • Monitor Triage systems for new customer reported suspicious emails
  • Perform initial assessment on reported suspicious emails to determine if email poses a threat to the customer, or is benign
  • Initiate threat analysis case for emails that pose a threat to the customer, and escalate to Sr. Threat Analysis team member.
  • Assist Sr. Threat Analysts during investigations.
  • Maintain ownership of cases opened for customers including updating cases, communicating with the customer, and documenting resolution
  • Assist in production of monthly customer reports
  • Maintain adequacy of skills by attending approved conferences, training, and other related events
  • Assist with creation and maintenance of products including updates and upgrades, backups, and troubleshooting
  • Response to customer requests submitted via ticketing systems and other communication channels
  • Other duties as assigned


Job ID 2017-1545

The above statements are neither intended to be an all-inclusive list of the duties and responsibilities of the job described, nor are they intended to be a listing of all of the skills and abilities required to do the job. Rather, they are intended only to describe the general nature of the job. This job description is not a contract of employment, either express or implied. Employment with PhishMe will be voluntarily entered into and your employment is considered at will. PhishMe reserves the right to alter the job description at any time without notice.




  • Minimum 3 years general securityexperience or education including demonstrated ability to perform phishing and malware analysis
  • Industry recognized certifications in Malware Analysis and Incident Response preferred
  • Ability to apply critical thinking to cyberthreatinvestigations
  • Ability to recognize need for prompt escalation of threats
  • Proficient in common technologies such as networking, operating systems, email Infrastructures such as Exchange and Office 365, anti-virus programs, and advanced threat detection systems
  • Proficient in common end-user applications such as web browsers and productivity applications such as MS Word, Excel, and PowerPoint that are commonly targeted by malware
  • 2-4 YearDegree in Computer Science or field experiencepreferred


  • Competitive salary and stock options
  • 401k with company match
  • Health, vision, dental, disability, life insurance
  • Telecom expense reimbursement