Information Technology

Senior Cybersecurity Threat Analyst

 We help the world run better

At SAP, we enable you to bring out your best. Our company culture is focused on collaboration and a shared passion to help the world run better. How? We focus every day on building the foundation for tomorrow and creating a workplace that embraces differences, values flexibility, and is aligned to our purpose-driven and future-focused work. We offer a highly collaborative, caring team environment with a strong focus on learning and development, recognition for your individual contributions, and a variety of benefit options for you to choose from.

 

We are seeking a skilled Cybersecurity Threat Analyst to join our dynamic cybersecurity team. This role is responsible for developing and implementing threat models, providing remediation advice and planning, conducting threat hunting activities, and proposing new detections. The ideal candidate will possess a strong background in cybersecurity with a focus on offensive and defensive techniques, demonstrating the ability to conduct proof of concept on vulnerabilities and educate the blue team on the use of offensive tooling.

 

Key Responsibilities include:

Threat Modeling and Remediation Planning:

  • Develop and maintain threat models to identify, assess, and mitigate potential security risks across the organization’s infrastructure.
  • Collaborate with cross-functional teams to understand business processes, systems, and data flows for accurate threat modeling.
  • Provide detailed remediation advice and planning to mitigate identified threats and vulnerabilities.
  • Work closely with the incident response team to ensure effective handling of security incidents based on threat models.

Threat Hunting and Detection:

  • Conduct proactive threat hunting activities to identify malicious activities, potential threats, and vulnerabilities within the organization’s network and systems.
  • Develop and implement new detection strategies and tools to identify and respond to emerging threats.
  • Analyze threat intelligence data to identify trends, patterns, and indicators of compromise (IOCs) to improve detection capabilities.
  • Regularly update detection mechanisms based on new intelligence and emerging threats.

Vulnerability Proof of Concept and Offensive Tooling Knowledge Transfer:

  • Perform proof of concept (PoC) testing on vulnerabilities to assess the potential impact and validate security controls.
  • Develop and document PoC scripts and methodologies for identified vulnerabilities to enhance understanding and response strategies.
  • Provide training and knowledge transfer to the blue team on offensive tooling, including the use and detection of tools used by adversaries.
  • Assist in the development of defensive tactics and techniques by leveraging insights gained from offensive tool usage.

Collaboration and Reporting:

  • Collaborate with the blue team and other security teams to enhance the organization’s overall security posture.
  • Prepare detailed reports and presentations on threat modeling, hunting activities, PoC findings, and detection proposals.
  • Communicate complex technical information to non-technical stakeholders to ensure a clear understanding of security risks and mitigation strategies.

 

Required Skills and Experience:

  • Bachelor’s degree in Computer Science, Information Security, or a related field; or equivalent experience.
  • 3+ years of experience in cybersecurity, with a focus on threat modeling, threat hunting, vulnerability assessment, or incident response.
  • Strong understanding of cybersecurity principles, threat landscapes, and offensive and defensive security techniques.
  • Hands-on experience with threat modeling methodologies, such as STRIDE, PASTA, or ATT&CK.
  • Proficiency in using cybersecurity tools for threat hunting, vulnerability assessment, and penetration testing (e.g., SIEM, IDS/IPS, EDR, Nmap, Metasploit, etc.).
  • Experience in developing and conducting proof of concepts for vulnerabilities and security controls.
  • Familiarity with offensive security tools and techniques, such as exploitation frameworks, malware analysis, and red teaming.
  • Strong analytical and problem-solving skills with the ability to think like an adversary.
  • Excellent communication skills, with the ability to articulate complex security issues to diverse audiences.

 

Preferred Skills:

  • Relevant cybersecurity certifications (e.g., CISSP, CEH, OSCP, GCIH, etc.).
  • Experience with scripting and automation (e.g., Python, PowerShell, Bash).
  • Knowledge of cloud security and securing cloud-based environments (AWS, Azure, GCP).
  • Experience working in a SOC or with incident response teams.

 

#SAPECSCareers

Bring out your best

SAP innovations help more than four hundred thousand customers worldwide work together more efficiently and use business insight more effectively. Originally known for leadership in enterprise resource planning (ERP) software, SAP has evolved to become a market leader in end-to-end business application software and related services for database, analytics, intelligent technologies, and experience management. As a cloud company with two hundred million users and more than one hundred thousand employees worldwide, we are purpose-driven and future-focused, with a highly collaborative team ethic and commitment to personal development. Whether connecting global industries, people, or platforms, we help ensure every challenge gets the solution it deserves. At SAP, you can bring out your best.

We win with inclusion

SAP’s culture of inclusion, focus on health and well-being, and flexible working models help ensure that everyone – regardless of background – feels included and can run at their best. At SAP, we believe we are made stronger by the unique capabilities and qualities that each person brings to our company, and we invest in our employees to inspire confidence and help everyone realize their full potential. We ultimately believe in unleashing all talent and creating a better and more equitable world.
SAP is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to the values of Equal Employment Opportunity and provide accessibility accommodations to applicants with physical and/or mental disabilities. If you are interested in applying for employment with SAP and are in need of accommodation or special assistance to navigate our website or to complete your application, please send an e-mail with your request to Recruiting Operations Team: Careers@sap.com
For SAP employees: Only permanent roles are eligible for the SAP Employee Referral Program, according to the eligibility rules set in the SAP Referral Policy. Specific conditions may apply for roles in Vocational Training.

EOE AA M/F/Vet/Disability:

Qualified applicants will receive consideration for employment without regard to their age, race, religion, national origin, ethnicity, age, gender (including pregnancy, childbirth, et al), sexual orientation, gender identity or expression, protected veteran status, or disability.
Successful candidates might be required to undergo a background verification with an external vendor.

Requisition ID: 403270  | Work Area: Information Technology  | Expected Travel: 0 - 10%  | Career Status: Professional  | Employment Type: Regular Full Time   | Additional Locations: #LI-Hybrid.

Requisition ID:  403270
Posted Date:  Sep 4, 2024
Work Area:  Information Technology
Career Status:  Professional
Employment Type:  Regular Full Time
Expected Travel:  0 - 10%
Location: 

Bucharest, RO, 0030144

Job alert


Job Segment: ERP, Cloud, Testing, Computer Science, Information Security, Technology