Principal - Threat Intel

🌍 Remote, USA 🎯 Full-time 🕐 Posted Recently

Job Description

About the position

    Responsibilities
  • Research, develop, test, document, and implement global threat detection content across one or more SIEM platforms.
  • Tune threat detection content post-implementation based on emerging threats/TTPs, MITRE ATT&CK coverage, and strategic planning.
  • Validate and curate existing content periodically.
  • Support escalations in the context of threat detection.
  • Enable stakeholder teams strategically in the context of threat detection and SIEM expertise through research/detection briefs and internal workshops.
  • Produce and present clear and actionable reports to the team, stakeholders, and management around threat detection efficacy and gaps.
  • Contribute to the team's Jira backlog and strategic direction regarding prioritization and planning.
  • Act as a spokesperson for the team in-region and educate stakeholders on Threat Library.
  • Collaborate with stakeholder teams and lead joint tracks and recurring meetings.
  • Challenge existing processes and look for improvements in tooling and product delivery.
  • File bugs and feature requests to maintain high-quality standards and drive innovation.
  • Work with platform vendors as required.
  • Conduct peer reviews and provide input to peers upon request.
  • Mentor and guide junior team members.
    Requirements
  • Bachelor's degree or four or more years of work experience.
  • Six or more years of relevant work experience.
  • Experience working with SIEM platform(s) such as Splunk, QRadar, Microsoft Sentinel, Elastic, or SumoLogic.
  • Experience in Detection Engineering and developing, testing, and tuning threat detection content on at least one SIEM platform.
  • Excellent knowledge of the current threat landscape and modern analytical techniques for threat detection content.
  • Deep familiarity with the MITRE ATT&CK framework and general SIEM engineering concepts.
  • Demonstrated experience in at least two domains relevant to security and telemetry used for detection content, such as Windows and Active Directory, EDR, AWS, Azure/O365, GCP, OT, or IoT.
  • Working knowledge of major protocols in the OSI Model (TCP/IP, DNS, HTTP, SMTP) and their usage by threat actors.
    Nice-to-haves
  • Excellent problem-solving skills.
  • SANS GIAC certifications (GCIA, GCIH, GREM, GCFA, GPEN, GCPN, GXPN, GMON, GCDA, GCTI, GRID, GDAT) or similar technical security certifications.
  • Strong analytical, communication, documentation, and collaboration skills.
  • Strong passion for understanding cyber trends, TTPs, and emerging threats.
  • Ability to lead projects and perform well under pressure.
  • Previous experience as a SOC/CERT/CSIRT analyst.
  • Experience in incident response/digital forensics.
  • Experience managing threat detection in an MSSP/multi-tenant environment.
  • Experience with version control systems or CI/CD.
  • Experience in threat modeling and contributions to community-driven detection repositories.
  • Published research articles or presented at security conferences.
  • Experience in malware reverse engineering and cyber threat intelligence.
  • Experience in threat hunting across various telemetry sources.
  • Experience in penetration testing/red or purple teaming.
  • Knowledge of big data analytics and machine learning techniques.
  • Experience in scripting/Jupyter notebooks (Python).
    Benefits
  • Health insurance coverage
  • Dental insurance coverage
  • Vision insurance coverage
  • 401k benefit for retirement savings plan
  • 401(k) matching benefit
  • Paid holidays
  • Flexible scheduling options
  • Professional development opportunities
  • Tuition reimbursement
  • Employee discount programs
  • Mental health days
  • Paid volunteer time
  • Life insurance coverage
  • Disability insurance coverage

Apply Now

Apply Now

Ready to Apply?

Don't miss out on this amazing opportunity!

🚀 Apply Now

Similar Jobs

Recent Jobs

You May Also Like