CrawlJobs Logo

Principal Engineering Manager - Threat Intelligence

https://www.microsoft.com/ Logo

Microsoft Corporation

Location Icon

Location:
Ireland , Dublin

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

The Analyst Workbench engineering team builds the analyst workflows and underlying engineering platforms that supercharge Microsoft’s security analysts and customers. Our team is to enable the analyst to hunt malicious threat actors at scale. We are seeking a Principal Software Engineering Manager to lead the engineering team, drive architectural clarity, deliver a great analyst experience and champion engineering excellence.

Job Responsibility:

  • Build and lead a diverse, high‑performing engineering team
  • Provide technical direction, define and drive the technical strategy to deliver enduring value
  • Lead execution to deliver customer value built to a high engineering bar
  • Partner with product management, intelligence analysts and engineering teams to ship a cohesive analyst experience
  • Foster a culture rooted in curiosity, experimentation, customer empathy, and learning
  • Model Microsoft leadership principles: create clarity, generate energy, deliver success
  • Partner with recruiting to hire outstanding talent and maintain a diverse, world‑class engineering team

Requirements:

  • Bachelor’s degree in Computer Science or related field, or equivalent experience
  • 10+ years of professional software engineering experience
  • 5+ years leading engineering teams
  • Expertise in at least one general‑purpose programming language (C++, C#, Java, Python, Rust, TypeScript, etc.)
  • Deep experience architecting and delivering large‑scale distributed systems, AI‑enabled applications, or cloud services
  • Proven track record of leading engineering teams solving complex technical problems end‑to‑end
  • Strong analytical, problem‑solving, and debugging skills with emphasis on quality, performance, and operational excellence
  • Success working in fast‑moving environments where ambiguity is the norm and clarity must be created

Nice to have:

  • Familiarity with modern web stacks (.NET, Node.js, React, REST APIs)
  • Background in threat intelligence, cybersecurity, or large‑scale data processing
  • Experience with DevOps, microservices, cloud infrastructure, and enterprise SLAs
  • Experience building or operating ML-based systems, human‑in‑the‑loop workflows, retrieval‑augmented systems, or model‑driven platforms

Additional Information:

Job Posted:
February 01, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Principal Engineering Manager - Threat Intelligence

Principal Security Governance Engineer

The Principal Security Governance Engineer will lead the development and impleme...
Location
Location
United States , San Francisco
Salary
Salary:
183800.00 - 295200.00 USD / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Security, or a related field
  • 10+ years of experience in security governance, risk management, and compliance, preferably in a large-scale SaaS/Product environment
  • Strong knowledge of cybersecurity principles, technology-related regulations, and IT governance frameworks
  • Experience in leading security awareness and training programs
  • Excellent communication, documentation, presentation and leadership skills, with the ability to influence and engage stakeholders at all levels
  • CRISC, CISSP, CISA, or equivalent certifications are preferred.
Job Responsibility
Job Responsibility
  • Design and implement comprehensive security governance frameworks and risk management strategies using Atlassian products, tools and systems
  • Evaluate and report on the effectiveness of security controls and compliance with relevant laws and regulations, including HIPAA
  • Collaborate with cross-functional teams to integrate security practices into all aspects of the organization
  • Assume the HIPAA Security Officer role to ensure compliance with HIPAA security requirements
  • Develop and maintain policies and procedures to protect sensitive health information in Atlassian products and services
  • Conduct security audits and assessments to ensure ongoing compliance and address any gaps
  • Develop and implement security awareness and training programs to mitigate human risk factors
  • Conduct regular training sessions and workshops to educate employees on security best practices
  • Monitor, evaluate and improve HRM programs such as phishing simulations, mandatory training, threat intelligence liaison and audit support
  • Provide leadership and guidance to the Security Governance team, fostering a culture of security awareness and continuous improvement
What we offer
What we offer
  • benefits, bonuses, commissions, and equity
  • Fulltime
Read More
Arrow Right

Principal Engineer, Product Cybersecurity

As Principal Engineer, own and direct the cybersecurity design and analysis of m...
Location
Location
United States , Round Lake; Chicago
Salary
Salary:
112000.00 - 154000.00 USD / Year
https://www.baxter.com/ Logo
Baxter
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • BS in computer science, engineering, mathematics, information management, or related field with 5+ years of industry experience or Masters with 3+ years
  • Experience with threat modeling, penetration testing, fuzz testing, vulnerability scanning, secure code analysis
  • Experience with cybersecurity related software such as Blackduck, Coverity, etc.
  • Experience dealing with threat intelligence, CWEs and CVEs
  • Familiarity with cybersecurity related organizations and certifications such as UL (UL-2900), ICS-CERT, FIPS 140, etc.
  • Experience with cybersecurity functionality on embedded systems and hosted software applications
  • Requires strong organization and communication skills, with the ability to interface with both technical and non-technical personnel
  • Ability to convince management on courses of action with minimal assistance using both written and verbal methods
  • Must be able to provide solutions that reflect understanding business objectives.
Job Responsibility
Job Responsibility
  • Implement proof of concept project to define innovative solutions on platforms/server platforms
  • Lead implementation of medical device cybersecurity principles as part of an overall security architecture
  • Create, own, and maintain system requirements, architectures, risk analysis and other specifications that define the cybersecurity functionality of medical device systems both embedded and hosted
  • Create threat models of medical device systems and the interfaces between medical devices
  • Perform vulnerability scanning of medical device systems and analyze results
  • Monitor threat intelligence and analyze CWEs and CVEs that affect medical device systems and propose solutions
  • Drive cybersecurity improvements through the cross functional teams, primarily software
  • Lead discussions to resolve competing constraints between interrelated functions (Engineering, Risk Management, Compliance, Clinical, Human Factors, Regulatory, Marketing, Service)
  • Ensure compliance to the product development process and Quality System and Design Control requirements
  • Interface with regulatory bodies, representing Baxter and Baxter products, and ensure that regional cybersecurity needs are met
What we offer
What we offer
  • Support for Parents
  • Continuing Education/Professional Development
  • Employee Health & Well-Being Benefits
  • Paid Time Off
  • 2 Days a Year to Volunteer
  • Medical and dental coverage
  • Insurance coverage for basic life, accident, short-term and long-term disability, and business travel accident insurance
  • Employee Stock Purchase Plan (ESPP)
  • 401(k) Retirement Savings Plan
  • Flexible Spending Accounts
  • Fulltime
Read More
Arrow Right

Principal Product Manager Cloud Software/Central

Designs, plans, develops and manages a product or portfolio of products througho...
Location
Location
United States , San Jose
Salary
Salary:
148000.00 - 340500.00 USD / Year
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree or equivalent in computer science, engineering or related field of study
  • MBA or advanced degree in computer science or engineering preferred
  • 10+ years of work experience in related field
  • Technical understanding and knowledge of the relevant industry
  • Strong understanding of wired and wireless networking fundamentals, including 802.11 protocols, VLANs, switching, and routing
  • Experience with network monitoring and analytics, including telemetry, deep packet inspection (DPI), and AI-driven insights
  • Understanding of network access control (NAC), and Zero Trust security
  • Expertise in network traffic analysis and anomaly detection using AI/ML-based behavioral analytics
  • Strong understanding of threat intelligence, signature-based detection, and behavior-based security models
  • Experience with firewall policies, IDS/IPS, and anomaly detection in network environments
Job Responsibility
Job Responsibility
  • Independently leads and drives the end to end strategy and operational product roadmap for one or more complex products or a product portfolio
  • Builds and delivers the value proposition, target customer segments, and business case to bring innovative and disruptive products to market for a product portfolio with respect to the whole company product portfolio
  • Synthesizes market requirements (MRD) into marketing/customer details through having intimate customer knowledge and business, financial and industry market acumen
  • Guides key stakeholders on the portfolio strategy across all phases of the lifecycle
  • Creates and drives goal alignment and collaborates across one or more products' value chain partners to optimize margins and enable success of products per plans across the product lifecycle
What we offer
What we offer
  • Health & Wellbeing
  • Personal & Professional Development
  • Diversity, Inclusion & Belonging
  • Fulltime
Read More
Arrow Right

Enterprise Security Architect

The leading technical authority of design, implementation, and validation of Cyb...
Location
Location
United States , Broomfield
Salary
Salary:
140000.00 - 190000.00 USD / Year
hunterdouglas.com Logo
Hunter Douglas
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Expert knowledge of security best practices (encryption, data protection, design, privilege access, etc.)
  • Expert knowledge and experience with managing and implementing standard security technologies (DLP, MDM, SIEM, AV, IDS)
  • Solid knowledge in compliance management and certification (PCI, GDPR, CCPA)
  • Solid knowledge of network technologies (protocols, design concepts, access control)
  • Solid knowledge of identity technologies (protocols, design concepts, access control)
  • Solid knowledge of application technologies (protocols, design concepts, access control)
  • Expert knowledge to demonstrate excellent written and verbal communication
  • Expert knowledge and proficiency in planning, reporting, establishing goals and objectives, standards, priorities, and schedules
  • Bachelor’s degree or equivalent in related field
  • Minimum of 5 years’ experience in a principal Security Engineer or Architect role
Job Responsibility
Job Responsibility
  • Threat intelligence and threat landscape: Continuously obtain updated, accurate threat intelligence to update the company’s threat landscape
  • Control design: Ideate, suggest, and design solutions to identified risks, including process modifications, improved configurations, and technology selection
  • Process improvements: Build, align, and update Cybersecurity standards, operating procedures, and other documentation to ensure effective Cybersecurity adherence across the company
  • Procurement: Develop requirements for InfoSec vendor selection for new and replacement technologies and services
  • Implementation: Lead the onboarding of technology-related projects to ensure alignment with the company’s security policies, guidelines, and processes. The candidate will also need to lead other Security Engineers and analysts in project deployment, driving the execution and completion of initiatives
  • Technical authority: Assist Security Engineers and Analysts with the management and operation of Cybersecurity tools as needed, including EDR, firewall, email security, vulnerability management, application security, and identity systems
  • Bake security into the business: Interfaces with management and the user community to understand business needs, implement security best practices, and identify opportunities for improving security and compliance
  • Improve security awareness: Partners with the training and professional development staff to promote security awareness among the user community with lessons from the field. Champions the continuous improvement of Cybersecurity across all entities
  • Planning: Review and develop the company’s overall security program and manage multiple security projects in each period
  • Incident response: Support incident response processes to ensure thoroughness and effectiveness
What we offer
What we offer
  • Bonus target range: 35-40%
  • Generous benefits package including medical, dental, vision, life, disability
  • A company culture that prioritizes internal development and professional growth
  • Time off with pay
  • 401(k) plan with a degree of employer matching
  • Paid parental leave
  • Wellness programs and product discounts
  • Fulltime
Read More
Arrow Right

Enterprise Security Architect

The leading technical authority of design, implementation, and validation of Cyb...
Location
Location
United States , Broomfield
Salary
Salary:
140000.00 - 190000.00 USD / Year
hunterdouglas.com Logo
Hunter Douglas
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Expert knowledge of security best practices (encryption, data protection, design, privilege access, etc.)
  • Expert knowledge and experience with managing and implementing standard security technologies (DLP, MDM, SIEM, AV, IDS)
  • Solid knowledge in compliance management and certification (PCI, GDPR, CCPA)
  • Solid knowledge of network technologies (protocols, design concepts, access control)
  • Solid knowledge of identity technologies (protocols, design concepts, access control)
  • Solid knowledge of application technologies (protocols, design concepts, access control)
  • Expert knowledge to demonstrate excellent written and verbal communication
  • Expert knowledge and proficiency in planning, reporting, establishing goals and objectives, standards, priorities, and schedules
  • Bachelor’s degree or equivalent in related field
  • Minimum of 5 years’ experience in a principal Security Engineer or Architect role
Job Responsibility
Job Responsibility
  • Threat intelligence and threat landscape: Continuously obtain updated, accurate threat intelligence to update the company’s threat landscape
  • Control design: Ideate, suggest, and design solutions to identified risks, including process modifications, improved configurations, and technology selection
  • Process improvements: Build, align, and update Cybersecurity standards, operating procedures, and other documentation to ensure effective Cybersecurity adherence across the company
  • Procurement: Develop requirements for InfoSec vendor selection for new and replacement technologies and services
  • Implementation: Lead the onboarding of technology-related projects to ensure alignment with the company’s security policies, guidelines, and processes. The candidate will also need to lead other Security Engineers and analysts in project deployment, driving the execution and completion of initiatives
  • Technical authority: Assist Security Engineers and Analysts with the management and operation of Cybersecurity tools as needed, including EDR, firewall, email security, vulnerability management, application security, and identity systems
  • Bake security into the business: Interfaces with management and the user community to understand business needs, implement security best practices, and identify opportunities for improving security and compliance
  • Improve security awareness: Partners with the training and professional development staff to promote security awareness among the user community with lessons from the field. Champions the continuous improvement of Cybersecurity across all entities
  • Planning: Review and develop the company’s overall security program and manage multiple security projects in each period
  • Incident response: Support incident response processes to ensure thoroughness and effectiveness
What we offer
What we offer
  • Bonus target range: 35-40%
  • Generous benefits package including medical, dental, vision, life, disability
  • A company culture that prioritizes internal development and professional growth
  • Time off with pay
  • 401(k) plan with a degree of employer matching
  • Paid parental leave
  • Wellness programs and product discounts
  • Fulltime
Read More
Arrow Right

Principal Cybersecurity Incident Analyst

The Principal Analyst Cybersecurity Incident is a key role responsible for manag...
Location
Location
Australia , Melbourne
Salary
Salary:
Not provided
nttdata.com Logo
NTT DATA
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Information Technology or Computer Science preferred
  • Relevant certifications such as SANS GIAC Security Essentials (GSEC)
  • At least 5 years of experience in the technology information security industry
  • Hands-on experience in administering & managing SIEM platforms Palo Alto XSIAM, Splunk, Microsoft Sentinel etc.
  • Hands-on experience to Analyse logs/events from SIEM solution, wireshark and other infrastructure
  • Deep knowledge of cybersecurity concepts, technologies, and best practices
  • Experience in working in Security Operation Centre and Network Security operations
  • Hands-on experience in administering & managing Vulnerability Management solutions like Qualys, Tenable etc.
  • Hands-on experience in administering & managing SOAR Palo Alto Cortex XSOAR or other SOAR solutions
  • Expertise in writing new and interpreting query language SPL, KQL, XQL
Job Responsibility
Job Responsibility
  • Act like a SIEM consultant who provides expertise and guidance to organizations in setting up, managing, and improving their SOC capabilities
  • Look over dashboards, and reports from the previous day or shift, including checking for any new threats and identifying malware
  • Prepare for and respond to system breaches or attacks
  • Respond to hacks or network insecurities and working to prevent new ones
  • Participate in a shift roster which may comprise of shifts business hours and after hours
  • Assessing SIEM maturity: Evaluating the existing SIEM setup and capabilities of an organization
  • Developing or refining the SIEM infrastructure, the architecture, tools, processes, and workflows of a SOC
  • Implementing security technologies when necessary: Assessing, selecting, and implementing various security technologies such as SIEM, SOAR systems, intrusion detection systems, threat intelligence platforms, and incident response tools
  • Support the Security Management Lifecycle including: monitoring, investigation, research, correlation, trend analysis, remediation and siem configuration
  • Developing security policies and procedures: Assisting in developing, documenting, maintaining SOC standard operating procedures (SOPs), incident response plans, playbooks, and other security policies
  • Fulltime
Read More
Arrow Right

Gaming Principal, Cloud Threat Detection & Incident Response Engineer

We are seeking a Gaming Principal, Cloud Threat Detection & Incident Response En...
Location
Location
United States , Multiple Locations
Salary
Salary:
139900.00 - 274800.00 USD / Year
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Doctorate in Statistics, Mathematics, Computer Science, or related field AND 3+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
  • OR Master's Degree in Statistics, Mathematics, Computer Science, or related field AND 4+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
  • OR Bachelor's Degree in Statistics, Mathematics, Computer Science, or related field AND 6+ years experience in software development lifecycle, large-scale computing, threat modeling, cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), or operations incident response
  • OR equivalent experience
Job Responsibility
Job Responsibility
  • Architect and drive Gaming’s cloud-first detection and response vision by integrating Azure, AWS, and GCP (Google Cloud Platform) native security services and telemetry sources into TDIR (Threat Detection, Investigation, and Response) workflows
  • Lead adoption and optimization of Microsoft Defender for Cloud, Sentinel, Entra ID security, Defender for Cloud Apps, and other cloud-native security controls
  • Establish standards and reference architectures for cloud telemetry ingestion, normalization, enrichment, and threat analytics across diverse studio environments
  • Build and maintain high-fidelity, cloud-native detections targeting threat actors across identity, SaaS, PaaS, IaaS, and Kubernetes environments
  • Develop behavioral detections leveraging KQL (Kusto Query Language), automation, analytics, and ML-assisted methodologies
  • Partner with threat intelligence to map adversary TTPs (Tactics, Techniques, and Procedures) to cloud control surfaces and turn insights into durable detection engineering roadmaps
  • Serve as principal technical authority during major cloud-related incidents, providing expert guidance on identity compromise, lateral movement, key/material theft, resource manipulation, and multi-cloud attack paths
  • Formalize standards for cloud investigations, including telemetry requirements, visibility gaps, and automated triage workflows
  • Drive post-incident cloud hardening by influencing product teams, studio engineering, and platform owners
  • Architect and implement automation for detection deployment, evidence collection, containment, and remediation using Azure Functions, Logic Apps, and modern SOAR patterns
  • Fulltime
Read More
Arrow Right
New

Principal Threat Detection Engineer - Blue Team

We’re building a world of health around every individual — shaping a more connec...
Location
Location
United States , New York
Salary
Salary:
144200.00 - 288400.00 USD / Year
https://www.cvshealth.com/ Logo
CVS Health
Expiration Date
May 11, 2026
Flip Icon
Requirements
Requirements
  • 10+ years of experience in threat detection, hunting, penetration testing, and/or offensive security
  • 7+ years of experience in Microsoft Security tools (Defender for Endpoint, Sentinel), CrowdStrike, Splunk Cloud, and Cribl
  • 5+ years of experience with KQL, SPL, Python, PowerShell, or Bash scripting for automation and detection logic
Job Responsibility
Job Responsibility
  • Design, deploy, and continuously optimize high‑fidelity detections across SIEM platforms including Microsoft Sentinel, Splunk Cloud, and Cribl
  • Lead proactive threat hunting using Microsoft Defender, CrowdStrike, and other SOC tools to identify advanced and emerging adversary activity
  • Develop custom detection logic and automation using KQL, SPL, and scripting, iterating based on threat intelligence and environmental changes
  • Design and execute adversary emulation and purple team exercises to evaluate and improve detection and response effectiveness
  • Partner with defensive teams to translate offensive findings into actionable improvements aligned to the MITRE ATT&CK framework
  • Support penetration testing efforts and produce actionable assessments highlighting detection gaps and remediation opportunities
  • Integrate internal and external threat intelligence into detection strategies to prioritize risk and adapt alert logic
  • Support active incident investigations by providing insight into adversary tactics, detection blind spots, and response opportunities
  • Contribute to the development of enterprise‑wide threat detection strategy aligned with risk management objectives
  • Communicate detection coverage, gaps, and effectiveness to security leadership through clear, actionable reporting
What we offer
What we offer
  • Medical, dental, and vision coverage
  • Paid time off
  • Retirement savings options
  • Wellness programs
  • Bonus, commission or short-term incentive program
  • Equity award program
  • Fulltime
!
Read More
Arrow Right