Security Threat Intelligence Engineer

  • Remote - Worldwide

Remote

Cybersecurity

Senior

Summary

Cloud Security Services is seeking a 6-month remote Security Threat Intelligence Engineer Consultant to support their Threat Management team by collecting, processing, analyzing security threats, producing intelligence products, and maintaining threat data sources. Required skills include knowledge of common threats, penetration techniques, attack vectors, and various tools.

Requirements

  • Solid understanding of common and advanced threats, penetration/intrusion techniques & attack vectors such as Malware analysis, APT/Crimeware ecosystems, Exploit kits, Cyber Hunting, Cyber Threat intelligence, Software vulnerabilities & exploitation, Data analysis
  • Knowledge of current hacking techniques, cyber threat actors, attribution concepts, security analysis techniques, recent cyber incidents & vulnerability disclosures
  • Understanding of common threat analysis, and threat modeling techniques used in CTI such as diamond model, kill chain, F3EAD, MITRE ATT&CK framework, and the threat intelligence lifecycle
  • Competency in using common intelligence datasets obtained from information sharing sources, malware collections, & other internet derived data
  • Familiarity with the following tools: Threat Intelligence Platform (TIP), Threat intelligence feeds, STIX, MISP and TAXII frameworks, Open Source Intelligence feeds and tools (OSINT), Malware Analysis / Reversal Tools, Security Incident and Event Monitoring (SIEM), Security Orchestration, Automation & Response (SOAR), Network sniffers and packet tracing tools, Threat Intelligence Platforms (TIP), Security Information& Event Management (SIEM), Intrusion Detection& Prevention (IDS/IPS), End Point Detect& Response (EDR), Email and Web filtering technologies, link-analysis methods and software (e.g., Maltego, Analyst Notebook)
  • A minimum of 10 years of information security experience with at least 7 years of experience with all-source cyber intelligence and analysis; or the equivalent combination of higher education and/or real-world experience

Responsibilities

  • Collecting, processing, and analyzing information regarding security threats
  • Producing and disseminating intelligence products, advisories or tailored reports
  • Analyze and report on unique attack vectors, emerging cyber threats, and current trends used by malicious actors
  • Daily threat intelligence monitoring through open and closed sources
  • Continually improve how the threat intelligence team works, including creation of run books, procedures, automation or other efficiencies
  • Maintain, develop and continually analyze threat data/intelligence sources, both technical and non-technical
  • Identify, evaluate and communicate new and ongoing cyber security threats through regular and ad-hoc reporting; produce intelligence briefings, attribution reports, and position papers
  • Produce concise tactical warning bulletins and other analytic reports that detail daily findings, events, and activities
  • Conduct collection and support attribution and analysis from incident response and threat hunting functions case findings
  • Collection and analysis of All-Source intelligence, research data from multiple intelligence providers in order to analyze findings and produce quality Intelligence Products
  • Support threat hunts and purple teaming endeavors to identify threat actor groups and their techniques, tools, and processes utilizing threat intelligence
  • Analysis of anomalous log data, and results of collaborative team sessions to detect, and eradicate threat actors on the network
  • Analyze and support security incidents for further enrichment of detection and alerting capabilities
  • Generate reporting of trending metrics

Preferred Qualifications

  • Relevant industry security certifications such as CISSP, SANS GIAC (e.g. GCTI, GCIH, GNFA, GCFE, GCFA, GREM), AWS certifications (SAA, SAP, or SCS), etc
  • Experience developing and presenting cybersecurity topics in written products and presentations, including conference presentations, webinars, and blog posts
  • Familiarity with other security verticals such as: Digital Forensics, Incident Response, Threat Detection, Application Security, Cloud Security, Offensive Security
  • Networking experience with LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP, and NSRP) routing protocols and technologies
  • Considerable working knowledge in one or more of the following topics APT, Cybercriminals, financially motivated cyber groups, Hacktivism, DDoS attack methods, malware variants, Mobile and Emerging Threats, Social Engineering, Insider Threats
  • Broad network and technology awareness, with the ability to convey complex or technical topics in a clear and concise manner
Share this job:
Please let Cloud Security Services know you found this job on Remote First Jobs 🙏

Benefits of using Remote First Jobs

Discover Hidden Jobs

Unique jobs you won't find on other job boards.

Advanced Filters

Filter by category, benefits, seniority, and more.

Priority Job Alerts

Get timely alerts for new job openings every day.

Manage Your Job Hunt

Save jobs you like and keep a simple list of your applications.

Search remote, work from home, 100% online jobs

We help you connect with top remote-first companies.

Search jobs

Hiring remote talent? Post a job

Frequently Asked Questions

What makes Remote First Jobs different from other job boards?

Unlike other job boards that only show jobs from companies that pay to post, we actively scan over 20,000 companies to find remote positions. This means you get access to thousands more jobs, including ones from companies that don't typically post on traditional job boards. Our platform is dedicated to fully remote positions, focusing on companies that have adopted remote work as their standard practice.

How often are new jobs added?

New jobs are constantly being added as our system checks company websites every day. We process thousands of jobs daily to ensure you have access to the most up-to-date remote job listings. Our algorithms scan over 20,000 different sources daily, adding jobs to the board the moment they appear.

Can I trust the job listings on Remote First Jobs?

Yes! We verify all job listings and companies to ensure they're legitimate. Our system automatically filters out spam, junk, and fake jobs to ensure you only see real remote opportunities.

Can I suggest companies to be added to your search?

Yes! We're always looking to expand our listings and appreciate suggestions from our community. If you know of companies offering remote positions that should be included in our search, please let us know. We actively work to increase our coverage of remote job opportunities.

How do I apply for jobs?

When you find a job you're interested in, simply click the 'Apply Now' button on the job listing. This will take you directly to the company's application page. We kindly ask you to mention that you found the position through Remote First Jobs when applying, as it helps us grow and improve our service 🙏

Apply