Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Requirements
- Underground Monitoring & Collection
- Identify and infiltrate dark web marketplaces, forums, and closed channels (Telegram, IRC, Discord, etc.)
- Track threat actors' chatter related to exploits, malware, credentials, and attack tools
- Conduct HUMINT-style engagement when permissible and safe
- Threat Data Harvesting
- Extract and validate IOCs (hashes, domains, wallet addresses, C2 servers)
- Correlate underground findings with OSINT, malware telemetry, and CTI feeds
- Provide early warning on data leaks, ransomware negotiations, and credential dumps
- Collaboration with CTI & AI Teams
- Feed structured underground intelligence into the CTI platform for enrichment and scoring
- Partner with ML engineers to train NLP models for dark web text mining
- Work with TI analysts to transform raw chatter into tactical and strategic intelligence
- Reporting & Dissemination
- Produce periodic dark web monitoring reports and client-specific alerts
- Contribute to threat actor profiles, campaign tracking, and risk advisories
- Provide insights to incident response and red team exercises
- Technical Expertise
- Deep knowledge of Tor, I2P, Freenet, and underground marketplaces
- Familiarity with cryptocurrency ecosystems (Bitcoin, Monero, mixers, blockchain tracing)
- Proficiency in harvesting IOCs and mapping to frameworks like MITRE ATT&CK
- Understanding of STIX/TAXII, MISP, and TI platform ingestion formats
- Research & Intelligence
- Strong OSINT/HUMINT tradecraft, ability to pivot from dark web to surface intel
- Experience monitoring ransomware leak sites, carding forums, and exploit brokers
- Analytical ability to contextualize underground activity in geopolitical/cybercrime terms
- Tooling & Automation
- Hands-on with dark web monitoring tools (Flashpoint, KELA, DarkOwl, CyberSixgill, custom scrapers)
- Scripting for data extraction (Python, Scrapy, APIs)
- Familiarity with data visualization tools (Maltego, Kibana, Power BI)
- Soft Skills
- Ability to communicate highly technical underground findings in executive-friendly language
- Discretion, OPSEC awareness, and strong ethical boundaries
- Collaborative mindset with TI analysts, IR, and platform engineers
- 7-10 years in cybersecurity/cyber threat intelligence, with 5+ years focused on dark web research or underground monitoring
- Demonstrated experience infiltrating and monitoring dark web communities
- Strong record of correlating dark web findings with threat intelligence and incident response cases
- Hands-on exposure to CTI platforms (MISP, Anomali, ThreatConnect, Recorded Future, etc.)
- Familiarity with malware ecosystems, data leaks, and exploit sales
- Certifications desirable: GCTI, GIAC Cyber Threat Intelligence, OSINT-specific certifications (Bellingcat, SANS OSINT), blockchain tracing certifications
Key Skills
Ranked by relevanceReady to apply?
Join Visionary Tech Services and take your career to the next level!
Application takes less than 5 minutes

