
IT Manager, Threat Intelligence
Medtronic
full-time
Posted on:
Location Type: Hybrid
Location: Mounds View • California • Colorado • United States
Visit company websiteExplore more
Salary
💰 $132,800 - $199,200 per year
Tech Stack
About the role
- Lead the Threat Intelligence team in identifying, analyzing, and reporting on cyber threats, adversaries, and vulnerabilities relevant to our organization
- Develop and mature the organization’s threat intelligence program, including frameworks, policies, and procedures
- Integrate intelligence findings into security operations, incident response, vulnerability management, and risk assessments
- Oversee the development of threat intelligence products such as alerts, briefs, and reports tailored to stakeholders at various levels
- Collaborate with SOC, Incident Response, Risk, Vulnerability Management, and executive leadership to provide actionable threat insights
- Maintain relationships with external threat intelligence providers, ISACs, government entities, and industry peers
- Lead intelligence-driven threat hunting and enrichment of security alerts with contextual data
- Provide mentorship and guidance to team members, fostering skill development and growth
- Ensure compliance with applicable regulations and data privacy requirements related to intelligence collection and use
- Oversee day-to-day threat intelligence collection, analysis, and dissemination activities, ensuring timely and actionable outputs
- Supervise the creation of threat assessments, actor profiles, and intelligence reports that inform defense strategies and executive decision-making
- Ensure integration of threat intel into incident response, threat hunting, and vulnerability management functions
- Establish and maintain trusted partnerships with internal teams and external sources such as ISACs, government agencies, vendors, and peer organizations
- Promote cross-functional threat intelligence sharing to enhance situational awareness and early warning capabilities
- Represent the organization in intelligence-sharing communities and influence standards or best practices when possible
- Expand Global threat intelligence briefing and participate in Cyber Security Awareness activities
- Lead and participate in active incident response activities as needed and on-call
Requirements
- Bachelor’s degree
- 5+ years of experience with a bachelor’s degree or 3+ years of experience with an advanced degree
- Strongly Preferred: Bachelor’s degree in Cybersecurity, Computer Science, Intelligence Studies, or related discipline
- 5+ years of experience in a threat intelligence or cyber threat analysis role
- Strong understanding of the cyber threat landscape, including nation-state and criminal actors, TTPs, and attack frameworks (e.g., MITRE ATT&CK)
- Familiarity with threat intelligence platforms (TIPs), SIEMs, EDRs, and other security technologies
- Experience with threat intelligence lifecycle, OSINT collection, and enrichment tools
- Excellent written and verbal communication skills, with the ability to brief both technical and non-technical stakeholders
- Previous leadership or management experience
- 5+ years of information security assessment, architecture, engineering and/or operations experience
- 5+ years of experience aligned to a relevant architecture discipline (integrations, data, services, applications, infrastructure)
- 5+ years of experience resulting in expert knowledge of Enterprise-class architecture concepts, definitions, and creation
- Specialized training in managing and communicating top secret and/or confidential information
- Certifications in one or more of the following: Information Security, OSCP, CISSP, Ethical Hacking, and Offensive Security
- Advanced knowledge and training on the dark/black web activity
- High degree of ‘learning agility’ with the ability to readily consume and apply new information and concepts with developed analytical problem-solving skills
- Strong business acumen, decision making, and influence skills across all levels of an organization
- Experience in business capability and process modeling
- Ability to work collaboratively and partner with employees, leaders, clients, and vendors
- Demonstrated ability to work in a global, virtual organization
- Excellent presentation skills, including the ability to translate technical information into business terms (e.g., ability to explain complex technical solutions and architecture strategies to non-technical resources)
- Knowledge in user experience modeling, information design, and concept generation
- Technology depth and credibility with technical staff
- Work experience in the Medical Device Industry, or other regulated industry
- Ability to mentor and develop business, architecture, and technical resources
- For Baccalaureate degrees earned outside of the United States, a degree that satisfies the requirements of 8 C.F.R. § 214.2(h)(4)(iii)(A) is required.
Benefits
- Health, Dental and vision insurance
- Health Savings Account
- Healthcare Flexible Spending Account
- Life insurance
- Long-term disability leave
- Dependent daycare spending account
- Tuition assistance/reimbursement
- Simple Steps (global well-being program)
- Incentive plans
- 401(k) plan plus employer contribution and match
- Short-term disability
- Paid time off
- Paid holidays
- Employee Stock Purchase Plan
- Employee Assistance Program
- Non-qualified Retirement Plan Supplement (subject to IRS earning minimums)
- Capital Accumulation Plan (available to Vice Presidents and above, or subject to IRS earning minimums)
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard Skills & Tools
threat intelligencecyber threat analysisOSINT collectionthreat intelligence lifecycleMITRE ATT&CKinformation security assessmententerprise-class architectureanalytical problem-solvingvulnerability managementincident response
Soft Skills
leadershipcommunicationcollaborationmentorshipdecision makinginfluencelearning agilitypresentation skillsbusiness acumenorganizational skills
Certifications
CISSPOSCPEthical HackingOffensive SecurityInformation Security