採用
Benefits & Perks
•Competitive compensation
•Comprehensive benefits
•Flexible work environment
•Wellness and community outreach days
•Recognition programs
•Global collaboration opportunities
Required Skills
SQL
Presto SQL
Regular Expressions
Unix
Email security
Threat analysis
Signature development
About Us:
Proofpoint is a global leader in human- and agent-centric cybersecurity. We protect how people, data, and AI agents connect across email, cloud, and collaboration tools. Over 80 of the Fortune 100, 10,000 large enterprises, and millions of smaller organizations trust Proofpoint to stop threats, prevent data loss, and build resilience across their people and AI workflows. Our mission is simple: safeguard the digital world and empower people to work securely and confidently. Join us in our pursuit to defend data and protect people.
How We Work:
At Proofpoint you’ll be part of a global team that breaks barriers to redefine cybersecurity guided by our BRAVE core values:
Bold in how we dream and innovate
Responsive to feedback, challenges and opportunities
Accountable for results and best in class outcomes
Visionary in future focused problem-solving
Exceptional in execution and impact
The Role:
You are a Senior Cyber Security Analyst (email borne threats) or have a strong desire and a skill set to become one!
We are looking for a highly intelligent, analytical, driven person to join a dynamic group of people who are passionate about saving the world from the growing threat of e-mail borne threats: phishing, malware , BEC and spam. We are competing against a very active, creative, and motivated adversary who was credited as sending over 40 trillion spam/threat email messages last year alone! If you are interested in helping us achieve our goal and rid the world of phishing, malware and spam, we definitely would like to speak with you. We offer a challenging environment that fosters creativity and rewards excellence.
Your day to day
-
Member of a creative, enthusiastic, and geographically distributed team (in a 24/7/365 "follow the sun" model) that is responsible for identifying, parameterizing, and responding quickly to spam attacks levied against some of the world's largest organizations.
-
Analyze data and logs, search for specific patterns to identify email accounts take over, suspicious Ips, IP ranges, sending domains, etc, etc
-
Find suspicious behavioral patterns and identify/fix FNs/FPs
-
Analyze email messages reported by customers as well as work on large data sets in order to determine correct classification (spam, phishing, malware, BEC (Advanced Email Fraud), bulk, ham).
-
Some CONTENT DEVELOPMENT. Perform deep analyses of spam message headers & structures to identify novel spam features, and design various rules/signatures to detect those features and block email borne threats
-
Ad-hoc development of tools as necessary to aid/streamline analysis activities is a plus
-
As an Email Cybersecurity analyst, who has coding experience and skills - an opportunity to design and develop new Po Cs threat detection system(s) based on your expertise or learn how to add this skill to your toolset.
-
Developing and maintaining Python applications/tools, writing clean and efficient code, debugging and troubleshooting issues, collaborating with cross-functional teams, and participating in code reviews is a plus
Knowledge of database systems is a plus
-
Be available in an rotating on-call basis to respond to develop signatures, that detect and block an emerging or an ongoing threat(s)
-
Help us define the landscape, prevalence, and evolution of messaging abuse, threats, and attacks by participating in future requirements definition discussions of our products.
What you bring to the team
-
Deep knowledge of IP space
-
Deep knowledge of Domain space
-
Knowledge of different types of email borne attack vectors, tools and tactics
-
Solid SQL, Presto SQL skills – proven experience in query building is a must
-
In-depth knowledge of email borne threats: phishing, malware, BEC and spam. Ability to find and research suspicious patterns in sending Ips, URLs, domains, in conjunction with overall email structure (email headers and email context).
-
Ability to create detection signatures/rules (content development) based on observed suspicious patterns with experience of 2-4 or more years in the field.
-
General curiosity about the headers and structure of email messages.
-
General familiarity with how mail delivery works, knowledge of email security standards and protocols, such as SPF, DKIM, and DMARC, would be beneficial.
-
Practical knowledge (hands-on experience) with Regular Expressions
-
Minimum 2+ years hands-on experience with Python or a different programming language is a plus
-
Experience in one of Python frameworks (Django, Flask or Pandas) is a plus
-
Experience with data analysis, familiarity with cybersecurity best practices, and the ability to work with large datasets.
-
Familiarity with Unix environments and comfort with a range of Unix command line tools for manipulating and extracting content from text files is a must have
-
Familiarity and/or experience with LUA based detection signatures is a plus
-
Familiarity and/or experience with ClamAV and/or Yara and/or in-house developed framework allowing to research and create signature based detection on email borne threats based detection signatures is a plus
-
Willingness to play an important technical role
-
Demonstrated analytical and creative problem-solving abilities.
-
Ability to work independently yet fully integrate with worldwide, remote teams.
-
Can-do attitude with a focus on problem solving, product quality, and a strong desire to get the job done.
-
Requirements/Education and/or Equivalent Experience (including technical and non-technical capabilities)
-
BSCS or equivalent, or equivalent technical experience.
Why Proofpoint?
At Proofpoint, we believe that an exceptional career experience includes a comprehensive compensation and benefits package. Here are just a few reasons you’ll love working with us:
-
Competitive compensation
-
Comprehensive benefits
-
Career success on your terms
-
Flexible work environment
-
Annual wellness and community outreach days
-
Always on recognition for your contributions
-
Global collaboration and networking opportunities
Our Culture:
Our culture is rooted in values that inspire belonging, empower purpose and drive success-every day, for everyone.
We encourage applications from individuals of all backgrounds, experiences, and perspectives. If you need accommodation during the application or interview process, please reach out to accessibility@proofpoint.com.
How to Apply
Interested? Submit your application along with any supporting information- we can’t wait to hear from you!
Total Views
0
Apply Clicks
0
Mock Applicants
0
Scraps
0
Similar Jobs
About Proofpoint
Reviews
4.1
1 reviews
Work Life Balance
3.5
Compensation
2.0
Culture
3.0
Career
3.5
Management
3.0
55%
Recommend to a Friend
Pros
Opportunity to work on security product
Experience with full stack development
Convenient location/close to home
Cons
Below market compensation
Limited backend/general CS exposure
Salary not competitive with other offers
Salary Ranges
509 data points
Junior/L3
Mid/L4
Senior/L5
Junior/L3 · Business Analyst
1 reports
$135,035
total / year
Base
$117,291
Stock
-
Bonus
-
$135,035
$135,035
Interview Experience
2 interviews
Difficulty
3.0
/ 5
Duration
14-28 weeks
Offer Rate
100%
Experience
Positive 50%
Neutral 50%
Negative 0%
Interview Process
1
Application Review
2
Recruiter Phone Screen
3
Technical Phone Screen
4
Onsite/Virtual Interviews
5
Offer
Common Questions
Coding/Algorithm
Technical Knowledge
Behavioral/STAR
System Design
Culture Fit
News & Buzz
Proofpoint details TA584’s fast-evolving 2025 attacks - SecurityBrief Australia
Source: SecurityBrief Australia
News
·
5w ago
Proofpoint Names Joyce Kim as Chief Marketing Officer - The Software Report
Source: The Software Report
News
·
6w ago
Proofpoint: The $12B Deal Behind an AI-Driven Cybersecurity Leader - Thoma Bravo
Source: Thoma Bravo
News
·
7w ago
Latham Advises on Financing for Proofpoint’s Completed Acquisition of Hornetsecurity - Latham & Watkins LLP
Source: Latham & Watkins LLP
News
·
12w ago





