TENEX.AI

Threat Intelligence Engineer

TENEX.AI

full-time

Posted on:

Location Type: Hybrid

Location: Kansas CityKansasMontanaUnited States

Visit company website

Explore more

AI Apply
Apply

About the role

  • Support our threat intelligence efforts by collecting, analyzing, and reporting on emerging threats to enhance our overall security posture.
  • Collaborate with various security functions, and proactively identify and help to mitigate risks.
  • Assist in the proactive research, identification, and collection of threat intelligence from various sources, including open-source intelligence (OSINT), commercial feeds, and internal security data.
  • Analyze raw threat data to identify potential patterns and connections.
  • Draft clear and concise threat intelligence reports, briefings, and alerts for internal security teams (Security Operations, Incident Response).
  • Assist in tracking and maintaining information on threat actors, their motivations, capabilities, and tactics, techniques, and procedures (TTPs).
  • Support the development of technical indicators of attack (IOAs) and indicators of compromise (IOCs) based on observed adversary behaviors.
  • Monitor and analyze vulnerability disclosures and exploit trends to provide insights into potential risks.
  • Stay up-to-date with current cybersecurity threats, vulnerabilities, and industry best practices. Share findings with the security operations and detection engineering teams.

Requirements

  • 2-4+ years of experience in cybersecurity, with at least 1-2 years specifically focused on threat intelligence or a closely related field (e.g., Security Operations Center (SOC) analysis).
  • Solid foundational understanding of the threat landscape, including common threat actors and their objectives.
  • Familiarity with threat intelligence frameworks and methodologies (e.g., MITRE ATT&CK, STIX/TAXII).
  • Experience with or exposure to threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
  • Strong analytical and problem-solving skills.
  • Good written and verbal communication skills, with the ability to articulate technical findings clearly.
  • A keen desire to learn and grow within the threat intelligence discipline.
  • Ability to work independently and collaboratively in a team environment.
  • Experience with scripting languages (e.g., Python) for simple data manipulation or automation is a plus.
  • Familiarity with foundational concepts of malware analysis.
  • Relevant cybersecurity certifications (e.g., CompTIA Security+, GCTI, etc.).
  • Experience in a regulated industry environment.
Benefits
  • Competitive salary
  • Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.
  • Collaborate with a talented and innovative team focused on continuously improving security operations.
  • A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.

Applicant Tracking System Keywords

Tip: use these terms in your resume and cover letter to boost ATS matches.

Hard skills
threat intelligencecybersecuritydata analysisthreat intelligence frameworksMITRE ATT&CKSTIX/TAXIIscripting languagesPythonmalware analysisvulnerability analysis
Soft skills
analytical skillsproblem-solving skillswritten communicationverbal communicationteam collaborationindependencedesire to learnattention to detailreport writingcritical thinking
Certifications
CompTIA Security+GCTI