CrawlJobs Logo

Senior Cyber Threat Intelligence Engineer

geico.com Logo

Geico

Location Icon

Location:
United States , Chevy Chase

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

105000.00 - 215000.00 USD / Year

Job Description:

As a Senior Cyber Threat Intelligence Engineer, you will function as a deeply technical individual contributor responsible for advancing intelligence-driven threat detection and proactive threat hunting across GEICO’s environment. This role requires extensive hands-on experience, strong analytic judgment, and the ability to independently execute complex work that directly contributes to reducing cyber risk. You will be expected to operate with a high degree of autonomy, applying your technical expertise to identify adversary behavior, develop actionable insights, and drive meaningful outcomes without requiring close supervision.

Job Responsibility:

  • Analyze and assess advanced cyber threats, adversary behavior, tooling, and campaigns relevant to GEICO
  • Develop and execute intelligence-informed threat-hunting hypotheses using endpoint, network, and cloud telemetry
  • Build, maintain, and enhance custom tools, scripts, and automation to support intelligence analysis and hunting workflows
  • Use programming and scripting languages (e.g., Python, PowerShell, Bash, or similar) to analyze data, enrich intelligence, and automate manual processes
  • Translate threat intelligence into actionable detection logic, investigative guidance, and response context
  • Produce clear, well-structured written intelligence products, including assessments, briefings, and reports for both technical and non-technical audiences
  • Support active investigations by providing timely adversary context during incidents
  • Track emerging threats, vulnerabilities, and adversary trends, prioritizing relevance and impact
  • Continuously improve analytic tradecraft, tooling, and processes to increase effectiveness and efficiency

Requirements:

  • 7+ years of experience in cyber threat intelligence, threat hunting, security operations, or a related cybersecurity discipline
  • Demonstrated hands-on experience conducting threat hunting in enterprise environments
  • Strong coding or scripting experience with the ability to design and maintain custom tools
  • Proven experience applying adversary frameworks such as MITRE ATT&CK to real-world detection and analysis
  • Experience producing written intelligence products that inform technical teams and leadership
  • Deep understanding of attacker techniques, intrusion workflows, malware, and phishing operations
  • Experience working with SIEM, EDR, and threat intelligence platforms
  • Ability to work independently, manage competing priorities, and deliver results under time constraints

Nice to have:

  • Experience supporting incident response or digital forensics activities
  • Familiarity with cloud platforms and cloud-based threat activity
  • Experience building internal CTI tooling, pipelines, or automation
  • Experience working in large enterprise or regulated environments
What we offer:
  • Comprehensive Total Rewards program
  • 401K savings plan with 6% match
  • Performance and recognition-based incentives
  • Tuition assistance
  • Mental healthcare
  • Fertility and adoption assistance
  • Workplace flexibility
  • GEICO Flex program (work from anywhere in the US for up to four weeks per year)

Additional Information:

Job Posted:
February 21, 2026

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Senior Cyber Threat Intelligence Engineer

Senior Cybersecurity Expert (Threat Intelligence)

At Bosch, we shape the future by inventing high-quality technologies and service...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field
  • Several years of experience in a technical cybersecurity role (e.g., CTI, SOC, Threat Hunting, Incident Response, DFIR)
  • Proven expertise in tracking and analyzing adversarial behavior, with strong knowledge of the cyber kill chain and MITRE ATT&CK framework
  • Ability to work methodically and independently while being an effective and reliable team player in a distributed team
  • Excellent communication skills with the ability to translate complex technical findings for diverse stakeholders
  • Strong scripting and tool development experience (Python, APIs, Git, Docker)
  • Fluent in English
  • German is a plus
Job Responsibility
Job Responsibility
  • Identify, analyze, and track threat actor TTPs and IOCs using threat prioritization frameworks and threat landscape monitoring
  • Investigate complex threat data to provide situational awareness, quantify trends, support ongoing investigations, and strengthen detection and response capabilities
  • Conduct in-depth technical analysis (searching, pivoting, enrichment) to support Threat Hunting and identify potential intrusions in Bosch networks and systems
  • Collaborate closely with cross-functional teams including Incident Response and Detection Engineering to integrate intelligence into detection and response workflows
  • Produce and deliver high-quality intelligence reports, briefings, and presentations tailored to technical, business, and executive audiences
  • Respond to Requests for Information (RFIs) and brief stakeholders on emerging campaigns and significant incidents
  • Develop and improve internal tools for threat analysis and monitoring (using Python, REST APIs, Git, Docker)
What we offer
What we offer
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Number of benefits for families (for instance summer camps for kids)
  • Non-working day on the 31st of December
  • Fulltime
Read More
Arrow Right

Senior Threat Detection Engineer

We’re expanding our Threat Detection Engineering team at Atlassian and looking f...
Location
Location
United States , San Francisco
Salary
Salary:
146300.00 - 235000.00 USD / Year
https://www.atlassian.com Logo
Atlassian
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Information Security, or a related field
  • Minimum 3 years experience in Detection Engineering roles
  • Experience building advanced data analytics and ML based detection models to identify complex threats
  • Experience building effective detection capabilities to modern cloud environments
  • Experience using common programming languages to build automation
  • Experience identifying threats through proactive threat hunting
  • Experience using security detection technologies and systems, including firewalls, intrusion detection systems, EDR, and authentication systems
  • Experience successfully delivering complex projects
  • Strong analytical skills and the ability to effectively identify and resolve problems
Job Responsibility
Job Responsibility
  • Develop advanced threat detection mechanisms using complex data analytics and machine learning models that can effectively identify and raise alerts for any adversarial or high-risk behaviors within the Atlassian’s systems
  • Continuous improvement and fine-tuning of detection systems to effectively adapt to new and emerging cyber threats
  • Monitor and enhance critical detection systems to ensure their reliability and effectiveness in delivering robust detection capabilities
  • Deploy new detection technologies to continuously uplift and improve our detection capabilities
  • Collaborate with partner teams such as Incident Response and Threat Intelligence is to establish and maintain meaningful security alerts
  • Work closely with these teams to ensure security alerts are relevant, actionable, and aligned with the overall security strategy
  • Collaborate closely with Product Engineering, Data Platform, and Security Engineering teams to advance our detection coverage and tooling in our production cloud environments
  • Automate complex security operational tasks, aiming to streamline and optimize routine security activities
  • Develop tools, systems, and programs to enhance and fortify Atlassian's overall security posture
  • Remain informed about the latest security trends, emerging threats, and evolving technologies to ensure that Atlassian is well-prepared to adapt to new security challenges
What we offer
What we offer
  • health and wellbeing resources
  • paid volunteer days
  • Fulltime
Read More
Arrow Right

Senior Acquisition Intelligence Support contractor

MAINSAIL Group is looking for an experienced Intelligence & Cyber Analyst to joi...
Location
Location
United States , Hanscom AFB
Salary
Salary:
Not provided
mainsailgroupinc.com Logo
MAINSAIL Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Top Secret/SCI Clearance and U.S. Citizenship required for all applicants
  • Bachelor’s degree and 15 years of experience in intelligence support to acquisition programs
  • Advanced knowledge of DoD, USAF, AFLCMC and private-sector acquisition principles, guidance, Executive Orders, regulations and procedures relevant to intelligence support to major Defense acquisition efforts
  • Knowledge of cyber threats and intelligence tracking and assessments of such threats, as they may impact SAOC mission areas
  • Experience supporting a range of DoD acquisition activities through various stages of the Defense Acquisition cycle
  • Possess the knowledge and mindset to play a key “forward leaning” support role as a senior contractor
  • The ability to effectively communicate in both written and verbal forms on highly technical topics
Job Responsibility
Job Responsibility
  • Contribute to and address specific SAOC program intelligence requirements while assessing the impact of technically advanced threat and security support issues to reduce program and operational risks
  • Work with SAOC Cyber team to assess cyber threats to SAOC mission areas and assist in developing solutions to such threats
  • Team with program offices, product centers, and the Intelligence Community (IC) to provide system engineering and technical analysis level inputs in support of major acquisition decisions
  • Provide acquisition intelligence technical and analytical support as outlined in annual Intel Support Taskings from AFLCMC/IN and external PEO customers
  • Review, tailor and analyze Threat Assessments relevant to the SAOC mission areas
  • Review, tailor and analyze System Threat Analysis Reports (STAR) and Validated On-Line Life-Cycle Threats (VOLTS) to the SAOC mission areas
  • Review, tailor and analyze ISR dependencies and Requirements that will support the SAOC mission areas
  • Review, tailor and analyze cross-program analyses, including external programs that impact SAOC subsystems and capabilities
  • Support technical Adversary Cyber Threat Assessments (ACTA) relevant to the SAOC mission areas
  • Support technical Intelligence supportability analyses for the SAOC mission areas
  • Fulltime
Read More
Arrow Right

Senior Cyber Security Consultant

Join Our Expert Team. We are seeking a skilled Senior Cyber Security Consultant ...
Location
Location
Austria , Vienna
Salary
Salary:
Not provided
alpenite.com Logo
Arsenalia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Master’s degree in Computer Science, Cybersecurity, Engineering or similar fields
  • 6-8 years of experience in senior cybersecurity roles, with at least 3 years in technical leadership positions
  • Solid expertise in enterprise security architectures, zero-trust frameworks, and multi-cloud security (AWS, Azure, GCP)
  • Proven track record in managing enterprise security programs and coordinating incident response teams
  • Strong skills in analyzing advanced threats and designing defense-in-depth strategies
  • Excellent strategic coordination and executive-level communication
  • Fluent in English (C1/C2) with experience in international environments
  • Willingness to travel frequently and lead projects across multiple geographies
  • Strong results orientation, strategic mindset, and continuous innovation drive
Job Responsibility
Job Responsibility
  • Design and implement security solutions for multi-cloud and hybrid environments
  • Lead strategic threat analysis and large-scale vulnerability assessments to shape long-term security planning
  • Manage complex incidents and breaches, coordinating cross-functional teams and engaging with C-level stakeholders
  • Embed security-by-design into digital transformation programs and enterprise architectures
  • Define and apply governance frameworks aligned with international standards (ISO 27001, NIST, SOC2)
  • Build proactive threat intelligence and hunting strategies to stay ahead of emerging risks
  • Mentor junior and mid-level security professionals, fostering a strong security-first mindset
  • Represent Arsenalia in high-level technical and business contexts, acting as a trusted advisor to enterprise clients
What we offer
What we offer
  • Welfare Package: A comprehensive corporate welfare platform, offering a wide range of benefits and healthcare support
  • Worklife Kit: A complete welcome package with all essentials for day-to-day productivity, complemented by comprehensive benefits
  • digital meal vouchers and flexible reimbursement options
  • Empowering People: Engagement initiatives, team building, and mentoring programs
  • Open Space, Open Mind: Modern open-space offices and collaborative areas
  • Career Path: internal Changemaker Path methodology to grow key relational, communication, and leadership skills
  • Learning & Development: Continuous improvement programs, certification opportunities, and incentives
Read More
Arrow Right

Head of cyber threat exposure and attack surface management

Lead the enterprise-wide Continuous Threat Exposure Management (CTEM) strategy, ...
Location
Location
United Kingdom , Knutsford
Salary
Salary:
Not provided
barclays.co.uk Logo
Barclays
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Experience in cybersecurity with direct exposure to vulnerability management, red teaming, or threat exposure reduction
  • Proven track record leading programs integrating CSPM, SSPM, ASM, BAS, or exposure correlation technologies
  • Strong understanding of attack paths, adversary emulation, and continuous validation concepts
Job Responsibility
Job Responsibility
  • Own and drive the global CTEM strategy, establishing a continuous, threat-driven exposure management lifecycle aligned with NIST, MITRE, and CISA Secure-by-Design principles
  • Lead and develop a high-performing CTEM team, fostering collaboration, technical excellence, and an outcome-driven culture
  • Integrate and oversee key exposure management technologies, including Cloud Security Posture Management (CSPM), SaaS Security Posture Management (SSPM), Attack Surface Management (ASM), Breach & Attack Simulation (BAS), and other exposure correlation platforms
  • Correlate assets, identity, vulnerability, and configuration to identify high-impact, exploitable attack paths and inform prioritized remediation strategies
  • Collaborate with Application Security, Vulnerability Management, Red Team, and Security Operations to synchronize discovery, validation, and remediation of exposures across the enterprise
  • Align CTEM outputs with real-world adversary behaviors, leveraging Red Team and Threat Intelligence input to validate attack paths and focus on exploitable conditions
  • Drive automation and AI-enabled analytics to continuously map, assess, and measure reductions in the organization’s attack surface
  • Translate technical findings into business risk language, enabling senior leadership and risk committees to make data-driven investment decisions
  • Define and lead CTEM governance and operating models, ensuring exposure assessments, validation, and remediation tracking are embedded in operational processes
  • Establish clear KRIs and maturity metrics that demonstrate continuous improvement in visibility, validation, and response effectiveness
What we offer
What we offer
  • Competitive holiday allowance
  • Life assurance
  • Private medical care
  • Pension contribution
  • Fulltime
Read More
Arrow Right
New

Senior Staff Researcher

As a Senior Designated CTI Analyst (DCA) on the Unit 42 CTI Services Delivery Te...
Location
Location
United States , Santa Clara
Salary
Salary:
139600.00 - 225775.00 USD / Year
paloaltonetworks.com Logo
Palo Alto Networks
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 7 years of experience in the cyber threat intelligence (CTI) field with a specialized focus on intelligence engineering and threat research
  • Strong understanding of security tooling, including the underlying data structures and complex data flows required for modern defense
  • Strong ability to architect scalable solutions to process, deduplicate, and enrich threat data, ensuring all intelligence is accurately tagged and discoverable by analytic end users
  • Knowledge of cyber threat actors, noteworthy attacks, and the ability to quickly recognize shifts or deviations from threat activity baselines. Ability to provide tailored defensive recommendations based on identified activity
  • A proven track record of proactive threat hunting within enterprise security consoles with a strong preference for experience using Palo Alto Networks’ Cortex product
  • Experience communicating complex threat intelligence to diverse audiences, including C-suite executives
  • Proven ability to operate under short-fuse deadlines, manage concurrent tasks, and thrive in complex and sometimes ambiguous situations
  • Deep experience with cyber threat intelligence frameworks (e.g., MITRE ATT&CK) and advanced analytical techniques
  • Previous experience supporting a customer organization as a designated resource preferred
Job Responsibility
Job Responsibility
  • Integrate intelligence use cases into security tooling, including data feed collation, deduplication, and the creation of threat dashboards
  • Correlate raw network and host-based indicators to attribute activity to specific threat actor groups, intrusion clusters, and malware families
  • Utilize Palo Alto Networks telemetry, commercial tools, and open-source data to identify and track threat activities of interest, pivoting between the customers findings and Palo Alto Networks telemetry
  • Leverage intelligence discoveries to perform threat hunts within the client’s Cortex security console
  • Provide tailored research and analysis for client-based Requests for Information (RFIs) to include relevant cyber threat activities, trends, or shifts in the threat landscape
  • Create a cyber threat profile that identifies top threats and provides tailored defensive recommendations based on their unique operational footprint
  • Assist in upskilling customer team capacity through mentorship sessions, and other micro-learning initiatives on best practices in CTI
  • Provide monthly briefings to customer leadership highlighting relevant threats, trends, and support provided
  • Fulltime
Read More
Arrow Right
New

Senior Staff Researcher

As a Senior Designated CTI Analyst (DCA) on the Unit 42 CTI Services Delivery Te...
Location
Location
United States , Santa Clara
Salary
Salary:
139600.00 - 225775.00 USD / Year
paloaltonetworks.it Logo
Palo Alto Networks Italia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of 7 years of experience in the cyber threat intelligence (CTI) field with a specialized focus on intelligence engineering and threat research
  • Strong understanding of security tooling, including the underlying data structures and complex data flows required for modern defense
  • Strong ability to architect scalable solutions to process, deduplicate, and enrich threat data, ensuring all intelligence is accurately tagged and discoverable by analytic end users
  • Knowledge of cyber threat actors, noteworthy attacks, and the ability to quickly recognize shifts or deviations from threat activity baselines. Ability to provide tailored defensive recommendations based on identified activity
  • A proven track record of proactive threat hunting within enterprise security consoles with a strong preference for experience using Palo Alto Networks’ Cortex product
  • Experience communicating complex threat intelligence to diverse audiences, including C-suite executives
  • Proven ability to operate under short-fuse deadlines, manage concurrent tasks, and thrive in complex and sometimes ambiguous situations
  • Deep experience with cyber threat intelligence frameworks (e.g., MITRE ATT&CK) and advanced analytical techniques
  • Previous experience supporting a customer organization as a designated resource preferred
Job Responsibility
Job Responsibility
  • Integrate intelligence use cases into security tooling, including data feed collation, deduplication, and the creation of threat dashboards
  • Correlate raw network and host-based indicators to attribute activity to specific threat actor groups, intrusion clusters, and malware families
  • Utilize Palo Alto Networks telemetry, commercial tools, and open-source data to identify and track threat activities of interest, pivoting between the customers findings and Palo Alto Networks telemetry
  • Leverage intelligence discoveries to perform threat hunts within the client’s Cortex security console
  • Provide tailored research and analysis for client-based Requests for Information (RFIs) to include relevant cyber threat activities, trends, or shifts in the threat landscape
  • Create a cyber threat profile that identifies top threats and provides tailored defensive recommendations based on their unique operational footprint
  • Assist in upskilling customer team capacity through mentorship sessions, and other micro-learning initiatives on best practices in CTI
  • Provide monthly briefings to customer leadership highlighting relevant threats, trends, and support provided
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Expert

Senior Cybersecurity Expert (Threat Intelligence) position at Bosch focusing on ...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field
  • Several years of experience in a technical cybersecurity role (e.g., CTI, SOC, Threat Hunting, Incident Response, DFIR)
  • Proven expertise in tracking and analyzing adversarial behavior, with strong knowledge of the cyber kill chain and MITRE ATT&CK framework
  • Ability to work methodically and independently while being an effective and reliable team player in a distributed team
  • Excellent communication skills with the ability to translate complex technical findings for diverse stakeholders
  • Strong scripting and tool development experience (Python, APIs, Git, Docker)
  • Fluent in English
Job Responsibility
Job Responsibility
  • Identify, analyze, and track threat actor TTPs and IOCs using threat prioritization frameworks and threat landscape monitoring
  • Investigate complex threat data to provide situational awareness, quantify trends, support ongoing investigations, and strengthen detection and response capabilities
  • Conduct in-depth technical analysis (searching, pivoting, enrichment) to support Threat Hunting and identify potential intrusions in Bosch networks and systems
  • Collaborate closely with cross-functional teams including Incident Response and Detection Engineering to integrate intelligence into detection and response workflows
  • Produce and deliver high-quality intelligence reports, briefings, and presentations tailored to technical, business, and executive audiences
  • Respond to Requests for Information (RFIs) and brief stakeholders on emerging campaigns and significant incidents
  • Develop and improve internal tools for threat analysis and monitoring (using Python, REST APIs, Git, Docker)
What we offer
What we offer
  • Annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Professional support and possibility to share knowledge and best practices
  • Ongoing development opportunities in a multinational environment
  • Broad access to professional trainings (incl. language courses), conferences and webinars
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Fulltime
Read More
Arrow Right