

Share
Key Responsibilities:
Own and manage the threat intelligence processing control, ensuring consistent execution and continuous improvement.
Collaborate with internal teams to refine procedures for investigating indicators of compromise (IOCs) across various log sources and controls.
Integrate and optimize relevant technologies and platforms to support and enhance threat intelligence workflows, automation, and operational efficiency.
Maintain, optimize, and automate Malware Defense’s custom intelligence gathering workflows to improve speed, accuracy, and scalability.
Define and maintain documentation for threat intelligence processing standards, playbooks, and escalation paths.
Monitor control performance and identify opportunities for automation and efficiency.
Support audit and compliance efforts related to threat intelligence controls.
Required Qualifications:
Threat Intelligence Experience: Intermediate to Advanced understanding of threat actor tactics, techniques, and procedures (TTPs).
Log Investigation Skills: Intermediate to Advanced experience analyzing logs from email, web, and endpoint sources.
Scripting & Development Experience: Intermediate proficiency with:
Languages & Frameworks: Python, Node.js, JavaScript
Web Frameworks: Django, FastAPI, Flask, Streamlit
Infrastructure & Tools: Linux, Docker, NGINX
Databases & Caching: PostgreSQL, Redis
API Integration: Experience utilizing RESTful APIs for application and platform integrations
Technology Proficiency:
LogScale (Log Analysis)
CrowdStrike Falcon (EDR)
VirusTotal (Threat Research)
Tanium (Endpoint Management & Detection)
ProofPoint TAP (Email Threat Detection)
Trellix Endpoint Security
Trellix Web Security
Trellix Email Security
AI & Machine Learning Exposure: Experience working with artificial intelligence (AI), machine learning (ML), and model development or integration for threat detection, enrichment, or automation.
Desired Qualifications:
Strong organizational and documentation skills.
Experience working in cross-functional environments.
Ability to identify gaps and drive process improvements.
Familiarity with control ownership responsibilities in a cybersecurity or risk management context.
These jobs might be a good fit