Job Openings Senior Threat Intelligence Engineer

About the job Senior Threat Intelligence Engineer

Role Overview:

A Senior Threat Intelligence Engineer leads advanced intelligence-gathering efforts, proactively identifies emerging threats, and enhances the organizations security posture. They drive strategic intelligence initiatives and collaborate with multiple teams to operationalize threat intelligence effectively.

Key Responsibilities:

  • Lead the collection, enrichment, and dissemination of actionable threat intelligence from multiple sources, including dark web, commercial feeds, and internal telemetry.
  • Oversee brand protection strategies, ensuring continuous monitoring for impersonation, phishing, and fraudulent activities targeting the organization.
  • Conduct in-depth threat research and adversary profiling, mapping to frameworks like MITRE ATT&CK.
  • Perform advanced threat hunting across SIEM, EDR, and network logs to detect hidden threats.
  • Analyze dark web activities, tracking underground forums, marketplaces, and cybercriminal groups.
  • Develop and fine-tune custom detection rules for EDR, SIEM, and threat intelligence tools.
  • Collaborate with incident response, SOC to provide intelligence-driven security improvements.
  • Provide executive-level briefings on emerging threats and cyber risk trends.
  • Mentor and train junior analysts in threat intelligence methodologies and tools.

Skills and Qualifications:

  • Deep expertise in threat intelligence platforms (MISP,)
  • Strong knowledge of brand protection solutions (e.g., ZeroFox, Digital Shadows, Bolster).
  • Proficiency in EDR and XDR solutions (e.g., Crowd Strike, SentinelOne, Microsoft Defender ATP).
  • Hands-on experience with dark web monitoring, cybercrime tracking, and deep/dark web research tools.
  • Advanced understanding of threat actor tactics, malware analysis, and adversary tracking.
  • Experience developing custom threat intelligence automation and integrations.
  • Strong ability to correlate threat intelligence with attack techniques and security operations.
  • Excellent reporting and briefing skills for both technical and executive audiences.
  • 2+ years of experience in cybersecurity, with significant exposure to threat intelligence, threat hunting, and cyber investigations.

Certifications (Nice to Have):

  • MITRE ATT&CK Cyber Threat Intelligence Certification, CompTIA CySA+, CEH, or equivalent.