Toyota’s Threat Research & Analysis Center (TRAC) is responsible for the collection and dissemination of cybersecurity threat intelligence for all Toyota affiliates, supporting a threat informed defense strategy. TRAC Researchers are responsible for tracking threats internally and externally, supporting Incident Response and Incident Detection, conducting threat hunts, building tools and processes for automating workflows, and tracking threat actor infrastructure and payloads.
Essential Functions:
• Research threat actors, campaigns, trends, attack vectors and TTPs internally and externally to develop threat informed defenses.
• Track infrastructure and payloads associated with priority threats.
• Actively hunt for cybercrime and APT Tactics, Techniques and Procedures (TTPs).
• Work with the threat detection engineering team to translate high-fidelity, repeatable hunts into 24/7 monitoring alerts.
• Work with Incident Detection, Incident Response, and other teams to coordinate research topics, answer RFIs, and inform the global Toyota ecosystem of new and emerging or impending cyber threats.
• Participate in threat briefings and report creation.
• Document and update processes and procedures.
• Participate in an on-call rotation for Incident Response support.
• Other tasks and responsibilities as assigned by leadership.
• Be able to demonstrate an understanding of and ability to translate technical aspects such as digital forensics, malware analysis, APTs, and TTPs, to support the effective management of TRAC team operations
• Coordinate priorities amongst TRAC team members, documenting and communicating to all stakeholders as required.
• Develop robust reporting to reflect TRAC team activities, challenges and key updates for team members, management and other stakeholders.
Minimum Qualifications:
• 3+ years of experience in Security Operations, Incident Response, or Security Engineering.
• Malware analysis, reverse engineering, or digital forensics experience is a plus.
• Python development and experience building automation is a plus.
• Knowledge of cyber threat actors, groups, and the TTPs they operate with.
• Knowledge of operating system internals and attack techniques.
• Experience with offensive and defensive security tools and OSINT collection.
• Advanced knowledge of network monitoring and network exploitation techniques.
• Experience with common attack vectors, including advanced adversaries (nation state/financial motivation).
• Knowledge of how network protocols and applications work at the network level.
• Experience tracking threat actor infrastructure.
Preferred Qualifications:
• Ability to demonstrate analytical expertise, close attention to details, excellent critical thinking, logic, and solution orientation and to learn and adapt quickly.
• Self-motivated with a desire to set goals independently.
• Ability to learn and operate in a dynamic environment.
• Strong verbal and written communication skills.
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.
Become a vital part of our team as a DevOps (L3) Support Engineer focused on secure deployments and robust system reliability.
Join Lithia & Driveway as a Technology Support Specialist, where you’ll leverage your technical skills and customer service excellence to enhance our technology support.
As an IT Support Specialist at Veolia North America, you'll play a crucial role in delivering top-notch technical assistance to our diverse client base.
Become a key player in cyber security by joining Peraton as a Cyber Investigation Analyst focused on the Department of State's initiatives.
Become a key player at IKH Group as a Banking IT Business Analyst in a hybrid role, driving groundbreaking projects in the digital transformation landscape.
Be part of a cutting-edge team at Peraton as a Senior Malware Engineering Analyst, driving cybersecurity excellence and incident response.
Join Kyndryl as a Security Intern to gain hands-on experience in enterprise risk and security systems while working with a diverse and inclusive team.
As a Director of IT at Common Sense Media, you'll oversee vital IT systems to ensure secure and reliable technology access for staff.
We are looking for a Salesforce Onsite Enhancements/Support Lead with over 8 years of expertise to provide technical leadership in our Wisconsin office.
Become a pivotal Oracle Fusion Cloud E2P Lead at Accenture Federal Services, transforming government operations through innovative technology.
Join Abercrombie & Fitch as an IT Service Desk Specialist and be a key player in delivering exceptional technical support to our global teams.
Join LIV Golf as a Technology Support Engineer and play a vital role in managing macOS and Windows systems in a dynamic and innovative environment.
Join Redwood Credit Union as a Security Engineer, where your expertise will drive security policies and risk management across our operations.
Join Scalable Capital as a Security Operations Center Lead and contribute to shaping the future of digital investment in Europe.
Toyota Tsusho Corporation is the Toyota Group's general trading company that develops diversified businesses through consolidated companies in Japan and overseas and with customers around the world. The Company organized its business under operati...
16 jobsSubscribe to Rise newsletter