About Cyble
Cyble is revolutionizing the landscape of cybersecurity intelligence. Founded in 2019, Cyble began as a visionary college project and has quickly transformed into a leading force in proactive cyber threat detection and mitigation, that is now globally significant, with people in 20 countries - Headquartered in Alpharetta, Georgia,?and with offices in Australia, Malaysia, Singapore, Dubai, Saudi Arabia and IndiaOur mission is clear: to provide visibility, intelligence and cybersecurity protection using cutting-edge advanced technology, giving enterprises a powerful advantage. We democratize real-time intelligence about cyber threats and vulnerabilities, enabling organizations to take proactive measures and maintain robust cybersecurity. We strive to make the digital world a safer place for everyone.At Cyble, artificial intelligence (AI) and innovation are central to all operations, with a commitment to continuous improvement and excellence in both products and business practices. Cyble values inclusivity, offering team members autonomy and flexibility to balance their professional and personal lives. Cyble fosters a culture where employees voices are heard, contributions are recognized, and everyone is encouraged to be part of something extraordinary.
About the Role:
?As part of our growing Threat Research & Intelligence team, we're looking for a highly motivated?
Vulnerability Research and Intelligence Analyst
?to help us track, assess, and report on emerging vulnerabilities and exploitation trends. You'll play a key role in strengthening our defensive posture by turning threat data into actionable intelligence.
?What You'll Do At CYBLE
- Monitor and analyze newly disclosed vulnerabilities (CVEs, KEV, 0-days, PoCs).
- Develop custom scripts and tooling to automate data enrichment, correlation, and reporting across various vulnerability feeds and threat sources.
- Track exploitation activity across threat actor groups and malware campaigns.
- Collaborate with detection, response, and risk teams to drive mitigation efforts.
- Author technical advisories and executive summaries on high-impact threats.
- Maintain and enrich internal vulnerability intelligence platforms.
What You'll Need
- 1-2 years in OSINT, Threat Intel, vulnerability research, or security operations.
- Strong understanding of CVSS, CWE, CPEs, and vulnerability disclosure ecosystems is a must.
- Familiarity with MITRE ATT&CK, CISA KEV, NVD, and vendor advisories.
- Ability to communicate complex technical concepts clearly and concisely.
- Bonus: experience with CTF, Bug bounty, or automation (e.g., Python).