.Telecommunications Sector | Threat Hunter Company: Devoteam Transform your business with Devoteam, the AI-driven tech consulting. Become a leading company embracing AI for sustainable value. At Devoteam, we believe that technology with strong human values can actively drive change for the better. Discover how Tech for People unlocks the future, creating a positive impact on the people and the world around us. We are a global leading player in Digital Transformation for leading organisations across EMEA, with a revenue of €1B. We believe in transforming technology to create value for our clients, partners and employees in a world where technology is developed for people. We are proud of the culture we have built together. We are proud of our people at the service of technology. We are proud of our diverse environment. Because we are #TechforPeople. Join our multidisciplinary team of Cloud experts, Designers, Business consultants, Security experts, Engineers, Developers and other extraordinary talents, spread across more than 20 EMEA countries. Become one of our +10.000 tech and business leaders on cloud, data and cyber security. Let's fuse creativity with technology together and build innovative solutions that actively change things for the better. Job Description We are seeking a highly skilled and motivated Threat Analyst to join our cybersecurity team. The ideal candidate will be responsible for identifying and investigating cybersecurity threats, detecting potential data leaks, analyzing criminal activity, conducting deep web and dark web monitoring, producing IOCs, and performing malware analysis. Key Responsibilities : Threat Analysis : Monitor, detect, and analyze emerging threats across various attack vectors. Investigate suspicious activities that could indicate a security breach or advanced persistent threats (APTs). Leak Detection : Identify and assess potential leaks of sensitive data across public and private channels, ensuring prompt detection and response. Criminal Activity Analysis : Investigate activities related to potential criminal behavior within the organization's systems, focusing on fraud, hacking, or other illegal actions. Deep Web and Dark Web Monitoring : Conduct research and analysis on deep web and dark web forums to detect the sale or exchange of sensitive data, malware, or attack tools targeting the organization. IOC Production : Develop and maintain Indicators of Compromise (IOCs) including IP addresses, file hashes, URLs, and other threat intelligence to support threat detection and incident response. Malware Analysis : Reverse-engineer and analyze malware to understand its behavior, identify vulnerabilities it exploits, and create effective countermeasures or detection signatures. Qualifications Previous experience in cybersecurity, threat analysis, or incident response. Familiarity with dark web research tools and criminal activity monitoring platforms (e.G., DarkOwl, Intelligence X)