Bydgoszcz, Bydgoszcz, Kuyavian-Pomeranian Voivodeship, Polska
Atos Poland Global Services Sp. z o.o.
22. 1. 2026
Informacje o stanowisku
technologies-expected :
ZeroFox
CybelAngel
MISP
VirusTotal
URLScan.io
Shodan
Censys
YARA
ThreatConnect
Recorded Future
technologies-optional :
VirusTotal
URLScan.io
GreyNoise
DomainTools
Shodan
Censys
YARA
MISP
ThreatConnect
Recorded Future
ZeroFox
CybelAngel
HudsonRock
about-project :
As a Threat Intelligence Analyst in our Threat Research Team, you will play a key role in uncovering and analyzing emerging cyber threats. Your work will focus on deep research into threat actors, malware campaigns, and evolving TTPs, using both open-source and proprietary intelligence sources. This role requires a strong analytical mindset, technical expertise and a passion for continuous discovery. If youre driven by curiosity and thrive in a research-driven environment, we’d love to hear from you.
responsibilities :
Working in Security – one of the most dynamically developing areas in IT.
We also offer great development opportunities including financing of world class trainings and certifications.
Expanding your threat knowledge by taking part in conferences, lectures and exercises
Engaging in real-world threat intelligence operations, including dark net monitoring and actor profiling
Continuous work with emerging TTPs, threat actor tradecrafts, and evolving attack surfaces across industries.
Involvement in advanced threat research projects under Threat Research Center umbrella
requirements-expected :
Ability to navigate the entire CTI lifecycle - from intelligence collection and processing to deep analysis and strategic dissemination.
Understanding of the Diamond Model and Cyber Kill Chain, with the ability to pivot across diamond vertices and map threat actor behaviors throughout all phases.
Strong proficiency in analyzing and correlating threat data from diverse external sources such like VirusTotal, URLScan.io, GreyNoise, DomainTools, Shodan, Censys etc.
Ability to extract actionable intelligence from raw signals/indicators and enrich research with multi-source context.
Experience in malware analysis and creating and using YARA rules for conducting research across external sources, with the ability to identify patterns, classify malicious artifacts, and enrich intelligence through behavioral signatures.
Hands-on expertise with CTI tools (e.g., MISP, ThreatConnect, Recorded Future, ZeroFox, CybelAngel, HudsonRock).
Practical experience in identifying and tracking threat actors, campaigns, and emerging trends, with deep knowledge of evolving threats and the current modus operandi of adversaries.
Proactive and self-motivated, with a passion for innovation and continuous learning in the evolving landscape of emerging threats and adversaries TTPs. Skilled in navigating dark web marketplaces, forums, and leak sites to identify threat actor activity and extract actionable intelligence.
offered :
Work in a dynamic environment, as part of an international team
Opportunities to challenge yourself and sate your curiosity
Management without constant nagging and endless meetings
Benefits package and a competitive salary
Hybrid working model (max. 2 times per month based on a location)
benefits :
sharing the costs of sports activities
private medical care
sharing the costs of professional training & courses