Startup Careers

Be a part of our family by contributing to our portfolio companies’ innovation and success. Browse open positions below with Intel Capital portfolio companies.

Consulting Analyst at Vectra AI
United States of America

Vectra AI delivers a new class of advanced threat defense that delivers real-time detection and analysis of active network intrusions. Vectra technology picks up where perimeter security leaves off by providing deep, continuous analysis of both internal and Internet-facing network traffic to automatically detect all phases of a breach as attackers attempt to spy, spread, and steal within your network.

Vectra directly analyses network traffic in real time using a patent-pending combination of data science, machine learning, and behavioral analysis to detect attacker behaviors and user anomalies in the network. All detections are correlated and prioritized to show an attack in context, and Vectra AI's machine learning adapts as attacks evolve. 

Position Overview

Vectra's Threat Lab team represents the core security knowledge and research capability within the company – tasked with powering our leading-edge technologies and aiding customers.

Serving in the role of Consulting Analyst, you will join the Threat Lab team and use your deep knowledge of attack and penetration techniques to analyze and interpret real and persistent threats against our customers, piece together indicators of an attack to enumerate the kill-chain, and explain the observed threats in a meaningful and actionable way to both prospects and customers. This is a customer-facing role that reports into Customer Success.

You will resolve complex cyber security challenges and help customers learn how to distinguish benign from malicious network behavior. Leveraging cloud data and advanced machine learning models, you will apply your experience in defending vulnerabilities in real-world networks to anticipate customer challenges and help progress the core technologies of the company – with a focus on empowering customers to get ahead of the threat.

When not working with customers and analyzing the threats present within their networks, as a Consulting Analyst you are expected to research new security topics, engage in bug-hunts, and contribute to the community in a way that helps grow both your personal and company brands. As the voice of the customer, you will be an integral part of our success. 

Responsibilities

  • Provide training and guidance to customers in proper usage of the Cognito platform.
  • Analyze threats, piece-together exploitation trails, and study lateral movements of attackers within customer networks
  • Expertly explain to customers your conclusions and recommendations for mitigating or remediating an in-progress attack
  • Provide an attackers-eye-view to the evidence presented by the clients’ products and educate customers to the technical nature of the threat
  • Respond to and document customer requests for assistance
  • Provide timely status updates and proactively work cases to resolution
  • Collaborate across business to identify new detection models, identify new product features, and build content for both internal and external customer knowledge bases
  • Pursue security research topics that contribute to the knowledge and enumeration of new threats
  • Identify blind spots in customer network security architecture and provide expert guidance on remediation
  • Travel expected 25-50% 

Requirements

  • 4+ years of professional security consulting experience
  • 4+ years of attack and penetration testing experience
  • Understanding of modern malware construction techniques and the cyber-criminal ecosystem
  • Deep understanding of Network Intrusion Detection engines and methodologies.
  • Working knowledge of firewalls, networks proxies and endpoint security
  • Advanced proficiency with packet capture tools, PCAPs and their analysis
  • Understanding of network architectures including SPAN/mirroring configuration & network monitoring technologies (switching technologies)
  • Understanding of network protocols such as TCP/IP, DHCP, DNS, NAT, VPN, PKI, RADIUS, etc.
  • Scripting skills (preferably Python or Powershell) highly desired. Open source development a plus.