Level 3 Security Analyst investigating and disrupting sophisticated phishing and scam campaigns for Bolster. Supporting detection strategy and cross-functional collaboration in threat hunting capabilities.
Responsibilities
Lead end-to-end investigations into advanced phishing, scam, and impersonation campaigns across web, social media, and dark web.
Analyze phishing infrastructure including domains, hosting, redirects, phishing kits, cloaking techniques, and attacker tooling.
Triage and handle high-risk customer escalations and complex threat cases independently.
Collaborate with Threat Hunting, SOC, Sales, Marketing, and Product teams to support customer outcomes and detection improvements.
Mentor and guide L1/L2 analysts; support onboarding and knowledge sharing.
Analyze large-scale phishing datasets to derive trends, metrics, and actionable insights.
Contribute to improving and training Bolster’s automated phishing and scam detection engines.
Propose and drive process improvements, automation ideas, and workflow optimizations.
Create high-quality customer-facing reports and threat intelligence summaries.
Requirements
5+ years of hands-on experience in phishing, scam, or brand-abuse threat hunting.
Strong understanding of threat hunting methodologies and the threat intelligence lifecycle.
Experience analyzing phishing emails, websites, SMS, ads, and social media abuse.
Familiarity with phishing kits, domain abuse, hosting analysis, and attacker infrastructure.
Experience working with OSINT tools and datasets.
Ability to work independently in a fast-paced, SLA-driven environment.
Strong written and verbal communication skills (customer-facing).
Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience).
Prior experience in a startup or high-growth environment is a plus
Benefits
PLEASE NOTE THAT THIS ROLE REQUIRES IN OFFICE COLLABORATION/ATTENDANCE 3X A WEEK
Cybersecurity Analyst assisting in the review and implementation of cybersecurity initiatives across a large environment at Kemper. Responding to cyber threats and improving processes and technologies.
Senior Information Security Analyst managing Information Security Management System at BMLL Technology. Supporting compliance with ISO 27001 and enhancing security measures.
Graduate Cyber Security Analyst at McKesson participating in a 24 - month Cyber Academy program. Monitor security alerts and contribute to incident response efforts while gaining mentorship.
Threat Intelligence Analyst role analyzing cyber threats and providing strategic recommendations. Working with cybersecurity teams at PwC Canada to safeguard client data and systems.
Contract Security Analyst specializing in security operations and incident response for cloud security at Embark. Focus on alert handling, detection engineering, and data loss prevention.
Cyber Security Analyst providing security operations support for USAF Cloud One project. Engaging in incident response and cybersecurity compliance activities within a hybrid environment.
Cybersecurity Analyst responsible for monitoring, analyzing, and responding to security incidents in SOC. Developing detection rules and conducting threat - hunting campaigns within a hybrid work setup.
Information Security Analyst working with Optasia to enforce security controls and protect data. Collaborating on technical projects and auditing systems in a hybrid work environment.
Cyber Security Analyst investigating and responding to security events at A+E Global Media. Collaborating cross - functionally to improve detection and response processes.
Information Security Analyst handling security monitoring and incident response tasks for educational technology company. Collaborating with IT teams to enhance security measures and compliance.