
Threat Intelligence Engineer
TENEX.AI
full-time
Posted on:
Location Type: Hybrid
Location: Kansas City • Kansas • Montana • United States
Visit company websiteExplore more
Tech Stack
About the role
- Support our threat intelligence efforts by collecting, analyzing, and reporting on emerging threats to enhance our overall security posture.
- Collaborate with various security functions, and proactively identify and help to mitigate risks.
- Assist in the proactive research, identification, and collection of threat intelligence from various sources, including open-source intelligence (OSINT), commercial feeds, and internal security data.
- Analyze raw threat data to identify potential patterns and connections.
- Draft clear and concise threat intelligence reports, briefings, and alerts for internal security teams (Security Operations, Incident Response).
- Assist in tracking and maintaining information on threat actors, their motivations, capabilities, and tactics, techniques, and procedures (TTPs).
- Support the development of technical indicators of attack (IOAs) and indicators of compromise (IOCs) based on observed adversary behaviors.
- Monitor and analyze vulnerability disclosures and exploit trends to provide insights into potential risks.
- Stay up-to-date with current cybersecurity threats, vulnerabilities, and industry best practices. Share findings with the security operations and detection engineering teams.
Requirements
- 2-4+ years of experience in cybersecurity, with at least 1-2 years specifically focused on threat intelligence or a closely related field (e.g., Security Operations Center (SOC) analysis).
- Solid foundational understanding of the threat landscape, including common threat actors and their objectives.
- Familiarity with threat intelligence frameworks and methodologies (e.g., MITRE ATT&CK, STIX/TAXII).
- Experience with or exposure to threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
- Strong analytical and problem-solving skills.
- Good written and verbal communication skills, with the ability to articulate technical findings clearly.
- A keen desire to learn and grow within the threat intelligence discipline.
- Ability to work independently and collaboratively in a team environment.
- Experience with scripting languages (e.g., Python) for simple data manipulation or automation is a plus.
- Familiarity with foundational concepts of malware analysis.
- Relevant cybersecurity certifications (e.g., CompTIA Security+, GCTI, etc.).
- Experience in a regulated industry environment.
Benefits
- Competitive salary
- Opportunity to work with cutting-edge AI-driven cybersecurity technologies and Google SecOps solutions.
- Collaborate with a talented and innovative team focused on continuously improving security operations.
- A culture of growth and development, with opportunities to expand your knowledge in AI, cybersecurity, and emerging technologies.
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
threat intelligencecybersecuritydata analysisthreat intelligence frameworksMITRE ATT&CKSTIX/TAXIIscripting languagesPythonmalware analysisvulnerability analysis
Soft skills
analytical skillsproblem-solving skillswritten communicationverbal communicationteam collaborationindependencedesire to learnattention to detailreport writingcritical thinking
Certifications
CompTIA Security+GCTI