Back to Jobs

Principal - Threat Intel

Remote, USA Full-time Posted 2025-11-03
About the position Responsibilities • Research, develop, test, document, and implement global threat detection content across one or more SIEM platforms. • Tune threat detection content post-implementation based on emerging threats/TTPs, MITRE ATT&CK coverage, and strategic planning. • Validate and curate existing content periodically. • Support escalations in the context of threat detection. • Enable stakeholder teams strategically in the context of threat detection and SIEM expertise through research/detection briefs and internal workshops. • Produce and present clear and actionable reports to the team, stakeholders, and management around threat detection efficacy and gaps. • Contribute to the team's Jira backlog and strategic direction regarding prioritization and planning. • Act as a spokesperson for the team in-region and educate stakeholders on Threat Library. • Collaborate with stakeholder teams and lead joint tracks and recurring meetings. • Challenge existing processes and look for improvements in tooling and product delivery. • File bugs and feature requests to maintain high-quality standards and drive innovation. • Work with platform vendors as required. • Conduct peer reviews and provide input to peers upon request. • Mentor and guide junior team members. Requirements • Bachelor's degree or four or more years of work experience. • Six or more years of relevant work experience. • Experience working with SIEM platform(s) such as Splunk, QRadar, Microsoft Sentinel, Elastic, or SumoLogic. • Experience in Detection Engineering and developing, testing, and tuning threat detection content on at least one SIEM platform. • Excellent knowledge of the current threat landscape and modern analytical techniques for threat detection content. • Deep familiarity with the MITRE ATT&CK framework and general SIEM engineering concepts. • Demonstrated experience in at least two domains relevant to security and telemetry used for detection content, such as Windows and Active Directory, EDR, AWS, Azure/O365, GCP, OT, or IoT. • Working knowledge of major protocols in the OSI Model (TCP/IP, DNS, HTTP, SMTP) and their usage by threat actors. Nice-to-haves • Excellent problem-solving skills. • SANS GIAC certifications (GCIA, GCIH, GREM, GCFA, GPEN, GCPN, GXPN, GMON, GCDA, GCTI, GRID, GDAT) or similar technical security certifications. • Strong analytical, communication, documentation, and collaboration skills. • Strong passion for understanding cyber trends, TTPs, and emerging threats. • Ability to lead projects and perform well under pressure. • Previous experience as a SOC/CERT/CSIRT analyst. • Experience in incident response/digital forensics. • Experience managing threat detection in an MSSP/multi-tenant environment. • Experience with version control systems or CI/CD. • Experience in threat modeling and contributions to community-driven detection repositories. • Published research articles or presented at security conferences. • Experience in malware reverse engineering and cyber threat intelligence. • Experience in threat hunting across various telemetry sources. • Experience in penetration testing/red or purple teaming. • Knowledge of big data analytics and machine learning techniques. • Experience in scripting/Jupyter notebooks (Python). Benefits • Health insurance coverage • Dental insurance coverage • Vision insurance coverage • 401k benefit for retirement savings plan • 401(k) matching benefit • Paid holidays • Flexible scheduling options • Professional development opportunities • Tuition reimbursement • Employee discount programs • Mental health days • Paid volunteer time • Life insurance coverage • Disability insurance coverage Apply tot his job Apply To this Job

Similar Jobs