FREE ACCESS
5,000–10,000 jobs/day

See all jobs on JobTailor
Search thousands of fresh jobs every day.
Discover
- Fresh listings
- Fast filters
- No subscription required
Create a free account and start exploring right away.
Tech Stack
Tools & technologiesPython
About the role
Key responsibilities & impact- Research, track, and report on threat actors and campaigns targeting AI labs and technology sector
- Build and maintain tooling and automated pipelines
- Develop and execute intelligence-driven threat hunts
- Perform technical analysis of malware and phishing infrastructure
- Partner with Detection Engineering and Incident Response teams
- Curate and triage inbound intelligence from multiple sources
- Contribute to threat models and risk assessments
- Build and maintain external intelligence-sharing relationships
Requirements
What you’ll need- 5+ years of hands-on experience in cyber threat intelligence, threat hunting, or intrusion analysis
- Deep, demonstrable knowledge of specific nation-state or advanced criminal threat actors
- Strong engineering skills with production-quality Python (or similar)
- Comfortable performing malware analysis and log analysis
- Experience authoring detection logic (YARA, Sigma, Snort/Suricata, or SIEM-native queries)
- Ability to write clearly and concisely
- Existing network in the threat intelligence community
Benefits
Comp & perks- Competitive compensation and benefits
- Optional equity donation matching
- Generous vacation and parental leave
- Flexible working hours
- Lovely office space for collaboration
ATS Keywords
✓ Tailor your resumeApplicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
cyber threat intelligencethreat huntingintrusion analysismalware analysislog analysisPythonYARASigmaSnortSIEM-native queries
Soft Skills
clear writingconcise writing
