Know ATS Score
CV/Résumé Score
  • Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Security Threat Intelligence Engineer.
United States Jobs Expertini

Urgent! Security Threat Intelligence Engineer Job Opening In us – Now Hiring Cloud Security Services

Security Threat Intelligence Engineer



Job description

About the opportunity:



  • Cloud Security Services is seeking a Security Threat Intelligence Engineer Consultant to support their Threat Management Threat Intelligence team objectives to ensure cyber threats are continuously evaluated for risk and impact to client, customers, third parties, infrastructure, and wider ecosystem for all environments.

  • This is a 6-month remote opportunity.

Responsibilities:



  • Collecting, processing, and analyzing information regarding security threats provides indication and warnings of impending attacks.

  • Producing and disseminating intelligence products, advisories or tailored reports.
  • Analyze and report on unique attack vectors, emerging cyber threats, and current trends used by malicious actors.
  • Daily threat intelligence monitoring through open and closed sources.
  • Continually improve how the threat intelligence team works, including creation of run books, procedures, automation or other efficiencies.
  • Maintain, develop and continually analyze threat data/intelligence sources, both technical and non-technical.
  • Identify, evaluate and communicate new and ongoing cyber security threats through regular and ad-hoc reporting; produce intelligence briefings, attribution reports, and position papers.
  • Produce concise tactical warning bulletins and other analytic reports that detail daily findings, events, and activities.   Conduct collection and support attribution and analysis from incident response and threat hunting functions case findings.
  • Collection and analysis of All-Source intelligence, research data from multiple intelligence providers in order to analyze findings and produce quality Intelligence Products.  Support threat hunts and purple teaming endeavors to identify threat actor groups and their techniques, tools, and processes utilizing threat intelligence.
  • Analysis of anomalous log data, and results of collaborative team sessions to detect, and eradicate threat actors on the network.  Analyze and support security incidents for further enrichment of detection and alerting capabilities.
  • Continuously improve processes for use across detection sets for more efficient operations.  Generate reporting of trending metrics.
  • Acquire threat intelligence and technical indicators from external sources; develop tactical intelligence and technical indicators internally and collaborate with the incident response often.
  • Evaluate data sources for consideration in the improvement and expansion of the threat intelligence program.
  • Required Skills                                                                   Solid understanding of common and advanced threats, penetration/intrusion techniques and attack vectors such as Malware analysis APT/Crimeware ecosystems Exploit kits Cyber Hunting  Cyber Threat intelligence  Software vulnerabilities & exploitation  Data analysis  Knowledge of current hacking techniques, cyber threat actors, attribution concepts, security analysis techniques, recent cyber incidents and vulnerability disclosures.  Understanding of common threat analysis, and threat modeling techniques used in CTI such as diamond model, kill chain, F3EAD, MITRE ATT&CK framework, and the threat intelligence lifecycle.
  • Competency in using common intelligence datasets obtained from information sharing sources, malware collections, and other internet derived data.

Familiarity with the following tools:



  • Threat Intelligence Platform (TIP)  Threat intelligence feeds  STIX, MISP and TAXII frameworks  Open Source Intelligence feeds and tools (OSINT)  Malware Analysis / Reversal Tools  Security Incident and Event Monitoring (SIEM)  Security Orchestration, Automation & Response (SOAR)  Network sniffers and packet tracing tools.  Threat Intelligence Platforms (TIP)  Security Information& Event Management (SIEM)  Intrusion Detection& Prevention (IDS/IPS)  End Point Detect& Response (EDR) Email and Web filtering technologies  link-analysis methods and software (e.g., Maltego, Analyst Notebook)  Familiarity with:    Cloud platforms - AWS, Azure, GCP etc.   Meraki dashboard and products   Ability to write custom query logic for major Security Incident and Event Monitoring (SIEM) tools.

  • Ability to write SQL to search data warehouse databases.
  • A minimum of 10 years of information security experience with at least 7 years of experience with all-source cyber intelligence and analysis; or the equivalent combination of higher education and/or real-world experience.   Have experience working on threat intelligence teams with specific experience in cyber threat intelligence, cybersecurity operations, security monitoring, malware analysis, threat hunting, and/or adversary emulation.
  • Strong analytical reasoning skills with the ability to recognize and evaluate facts, objectively analyze events, blend and organize threat data from multiple sources.
  • Experience conducting intelligence research using existing tools, analyze data, making connections for purposes of creating intelligence products.  Possess organizational multitasking and commitment to follow-up.
  • Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing cyber threats.   Ability to communicate intelligence and analysis of cyber threats in various forms (written production; briefings) to varying audiences.  Understand common threat actor tactics, techniques, and procedures (TTPs) and how they are chained together.
  • Experience in working with a geographically diverse team in multiple time zones around the globe.  Broad experience managing complex projects, particularly projects requiring support and partnership outside your immediate team.   Ability to create and/or re-architect new and existing solutions in a scalable manner.  Are able to work independently and identify areas of need in highly ambiguous and time-sensitive situations.
  • Demonstrated familiarity and expertise with data analytics tools like Splunk, ELK, Snowflake or other searchable big data solutions.  Excellent analytical skills.
  • Collaborative team worker – both in person and virtually using WebEx or similar.  Excellent documentation skills; demonstrated proficiency in Microsoft Office including Word, Excel and PowerPoint.  Ability to work as liaison between business and information security / information technology.  Flexibility to accommodate working across different time zones.  Ability to work PST (Pacific Time Zone).  Excellent interpersonal communication skills with strong spoken and written English.  Business outcomes mindset.
  • Solid balance of strategic thinking with detailed orientation.
  • Self-starter, ability to take initiative.
  • Project management and organizational skills with attention to detail.

Preferred Skills                                             Relevant industry security certifications such as CISSP, SANS GIAC (e.g. GCTI, GCIH, GNFA, GCFE, GCFA, GREM), AWS certifications (SAA, SAP, or SCS), etc.    Experience developing and presenting cybersecurity topics in written products and presentations, including conference presentations, webinars, and blog posts.  Familiarity with other security verticals such as:



  • Digital Forensics, Incident Response, Threat Detection, Application Security, Cloud Security, Offensive Security.

  • Networking experience with LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP, and NSRP) routing protocols and technologies.
  • Considerable working knowledge in one or more of the following topics APT, Cybercriminals, financially motivated cyber groups, Hacktivism, DDoS attack methods, malware variants, Mobile and Emerging Threats, Social Engineering, Insider Threats.  Broad network and technology awareness, with the ability to convey complex or technical topics in a clear and concise manner.

      Required Education  Bachelor's degree (BA/BS) in Computer Science from four-year college or university; or equivalent training, education, and work experience.
  • Cybersecurity certifications such as CISSP, CISM, etc.
  • Preferred Education Cybersecurity certifications such as CISSP, CISM, etc.

      Powered by JazzHR

  • Required Skill Profession

    Computer Occupations



Your Complete Job Search Toolkit

✨ Smart • Intelligent • Private • Secure

Start Using Our Tools

Join thousands of professionals who've advanced their careers with our platform

Rate or Report This Job
If you feel this job is inaccurate or spam kindly report to us using below form.
Please Note: This is NOT a job application form.


    Unlock Your Security Threat Potential: Insight & Career Growth Guide


  • Real-time Security Threat Jobs Trends in us, United States (Graphical Representation)

    Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Security Threat in us, United States using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 33726 jobs in United States and 27 jobs in us. This comprehensive analysis highlights market share and opportunities for professionals in Security Threat roles. These dynamic trends provide a better understanding of the job market landscape in these regions.

  • Are You Looking for Security Threat Intelligence Engineer Job?

    Great news! is currently hiring and seeking a Security Threat Intelligence Engineer to join their team. Feel free to download the job details.

    Wait no longer! Are you also interested in exploring similar jobs? Search now: .

  • The Work Culture

    An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at Cloud Security Services adheres to the cultural norms as outlined by Expertini.

    The fundamental ethical values are:
    • 1. Independence
    • 2. Loyalty
    • 3. Impartiality
    • 4. Integrity
    • 5. Accountability
    • 6. Respect for human rights
    • 7. Obeying United States laws and regulations
  • What Is the Average Salary Range for Security Threat Intelligence Engineer Positions?

    The average salary range for a varies, but the pay scale is rated "Standard" in us. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.

  • What Are the Key Qualifications for Security Threat Intelligence Engineer?

    Key qualifications for Security Threat Intelligence Engineer typically include Computer Occupations and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.

  • How Can I Improve My Chances of Getting Hired for Security Threat Intelligence Engineer?

    To improve your chances of getting hired for Security Threat Intelligence Engineer, consider enhancing your skills. Check your CV/Résumé Score with our free Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.

  • Interview Tips for Security Threat Intelligence Engineer Job Success
    Cloud Security Services interview tips for Security Threat Intelligence Engineer

    Here are some tips to help you prepare for and ace your job interview:

    Before the Interview:
    • Research: Learn about the Cloud Security Services's mission, values, products, and the specific job requirements and get further information about
    • Other Openings
    • Practice: Prepare answers to common interview questions and rehearse using the STAR method (Situation, Task, Action, Result) to showcase your skills and experiences.
    • Dress Professionally: Choose attire appropriate for the company culture.
    • Prepare Questions: Show your interest by having thoughtful questions for the interviewer.
    • Plan Your Commute: Allow ample time to arrive on time and avoid feeling rushed.
    During the Interview:
    • Be Punctual: Arrive on time to demonstrate professionalism and respect.
    • Make a Great First Impression: Greet the interviewer with a handshake, smile, and eye contact.
    • Confidence and Enthusiasm: Project a positive attitude and show your genuine interest in the opportunity.
    • Answer Thoughtfully: Listen carefully, take a moment to formulate clear and concise responses. Highlight relevant skills and experiences using the STAR method.
    • Ask Prepared Questions: Demonstrate curiosity and engagement with the role and company.
    • Follow Up: Send a thank-you email to the interviewer within 24 hours.
    Additional Tips:
    • Be Yourself: Let your personality shine through while maintaining professionalism.
    • Be Honest: Don't exaggerate your skills or experience.
    • Be Positive: Focus on your strengths and accomplishments.
    • Body Language: Maintain good posture, avoid fidgeting, and make eye contact.
    • Turn Off Phone: Avoid distractions during the interview.
    Final Thought:

    To prepare for your Security Threat Intelligence Engineer interview at Cloud Security Services, research the company, understand the job requirements, and practice common interview questions.

    Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the Cloud Security Services's products or services and be prepared to discuss how you can contribute to their success.

    By following these tips, you can increase your chances of making a positive impression and landing the job!

  • How to Set Up Job Alerts for Security Threat Intelligence Engineer Positions

    Setting up job alerts for Security Threat Intelligence Engineer is easy with United States Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!