Skip to content
mimi

Dark Web Threat Analyst

Exploit Frontier

Remote (Global) Full-time Entry Level Yesterday

About the role

About the Role

ExploitFrontier's Threat Intelligence Division is looking for a Dark Web Threat Analyst to join our remote research team. You'll work on real-world threat monitoring across the Indian subcontinent landscape — tracking APTs, ransomware operators, and hacktivists — with your findings published on our threat intelligence platform.

What You'll Do

  • Conduct focused dark web scans on assigned targets, forums, and keyword selectors.
  • Triage and enrich Indicators of Compromise (IoCs) for ingestion into our TI pipeline.
  • Develop and refine YARA/Sigma detection rules based on observed campaigns.
  • Prepare concise intelligence summaries and threat actor.
  • Update daily shift logs and respond to time-sensitive escalation requests.
  • Collaborate with researchers on ongoing investigations and handoffs.

What We're Looking For

  • Demonstrable OSINT/dark web research interest with basic familiarity in YARA/Sigma rules and IoC handling (hashes, IPs, domains).
  • Working knowledge of MITRE ATT&CK framework and threat actor naming conventions — even lab-level exposure to MISP or OpenCTI counts.
  • Strong written skills for concise reports, shift logs, and actionable intelligence summaries.
  • Available for ~6 hours/day and reachable for time-sensitive escalation requests.
  • Comfortable following strict legal/ethical operating procedures and OPSEC guidelines.
  • Willing to sign NDAs and abide by company security policies.

A Note on Compensation

This is an unpaid internship. What we offer instead is genuine — you'll work with production-grade TI tooling, contribute to published threat research, and build a portfolio that speaks louder than most paid internships on a resume. We take your growth seriously, even if we can't pay for it yet.

Requirements

  • Demonstrable OSINT/dark web research interest with basic familiarity in YARA/Sigma rules and IoC handling (hashes, IPs, domains).
  • Working knowledge of MITRE ATT&CK framework and threat actor naming conventions — even lab-level exposure to MISP or OpenCTI counts.
  • Strong written skills for concise reports, shift logs, and actionable intelligence summaries.
  • Available for ~6 hours/day and reachable for time-sensitive escalation requests.
  • Comfortable following strict legal/ethical operating procedures and OPSEC guidelines.
  • Willing to sign NDAs and abide by company security policies.

Responsibilities

  • Conduct focused dark web scans on assigned targets, forums, and keyword selectors.
  • Triage and enrich Indicators of Compromise (IoCs) for ingestion into our TI pipeline.
  • Develop and refine YARA/Sigma detection rules based on observed campaigns.
  • Prepare concise intelligence summaries and threat actor.
  • Update daily shift logs and respond to time-sensitive escalation requests.
  • Collaborate with researchers on ongoing investigations and handoffs.

Skills

MISPMITRE ATT&CKOpenCTIOSINTSigmaYARA

Don't send a generic resume

Paste this job description into Mimi and get a resume tailored to exactly what the hiring team is looking for.

Get started free