We are partnering with a leading cybersecurity company dedicated to protecting organizations’ most critical assets and addressing their greatest risks—the vulnerabilities in people. Through a comprehensive suite of cloud-based solutions, the company empowers businesses worldwide to block targeted threats, secure sensitive data, and strengthen user resilience against cyber-attacks. The Opportunity You’ll be part of a global team that pushes boundaries to redefine cybersecurity, guided by our BRAVE core values: Bold in how we dream and innovate Responsive to feedback, challenges, and opportunities Accountable for results and delivering best-in-class outcomes Visionary in future-focused problem-solving Exceptional in execution and impact Key Responsibilities Work as part of a creative, globally distributed team in a 24/7/365 “follow the sun” model to identify and respond quickly to email-borne threats Analyze data, logs, and patterns to detect account takeovers, suspicious IPs, domains, and sending behaviors Investigate suspicious behavioral patterns and resolve false positives/negatives in detection systems Review and classify customer-reported email messages (spam, phishing, malware, BEC, bulk, ham) Perform deep analysis of email headers and structures to identify novel spam features and create detection signatures/rules Develop and maintain Python applications/tools to support threat detection and streamline analysis activities Collaborate with cross-functional teams to design and develop proof-of-concept threat detection systems Participate in code reviews, debugging, and troubleshooting to ensure system reliability Participate in a rotating on‑call schedule to respond to emerging threats and create detection signatures Contribute to defining the landscape, prevalence, and evolution of messaging abuse and threats What We’re Looking For Must‑Have Skills Deep knowledge of IP space and domain space Strong understanding of email-borne attack vectors, tools, and tactics (phishing, malware, BEC, spam) Solid SQL/Presto SQL skills with proven query-building experience Ability to create detection signatures/rules based on suspicious patterns (2–4+ years of experience) Familiarity with email headers, structures, and email security standards/protocols (SPF, DKIM, DMARC) Practical experience with Regular Expressions Minimum 2+ years of hands-on experience with Python or another programming language Familiarity with Unix environments and command-line tools for text file manipulation Strong analytical and problem-solving abilities Ability to work independently while collaborating effectively with global, remote teams Bachelor’s degree in Computer Science or equivalent technical experience Nice to Have Experience with Python frameworks (Django, Flask, Pandas) Familiarity with LUA-based detection signatures Experience with ClamAV, Yara, or custom frameworks for signature-based detection Background in data analysis and handling large datasets Exposure to cybersecurity best practices and anomaly detection techniques Experience developing proof-of-concept threat detection systems Contributions to security research or open-source projects Strong curiosity about email message structures and evolving threat tactics Work Environment Location: Córdoba, Argentina/ India Employment Type: Full-time Collaborative, global team environment with cross-functional interaction Agile application development setting, emphasizing adaptability and continuous improvement Flexible work arrangements to support productivity and work-life balance Culture rooted in values of innovation, accountability, and teamwork
APLICAR