CrawlJobs Logo

Senior Cybersecurity Expert (Threat Intelligence)

https://www.bosch.pl/ Logo

Robert Bosch Sp. z o.o.

Location Icon

Location:
Poland , Warszawa

Category Icon

Job Type Icon

Contract Type:
Employment contract

Salary Icon

Salary:

Not provided

Job Description:

At Bosch, we shape the future by inventing high-quality technologies and services that spark enthusiasm and enrich people’s lives. Our promise to our associates is rock-solid: we enjoy our work, we inspire each other, we provide equal growth opportunities for all team members, all roles are represented in all countries. We grow together!

Job Responsibility:

  • Identify, analyze, and track threat actor TTPs and IOCs using threat prioritization frameworks and threat landscape monitoring
  • Investigate complex threat data to provide situational awareness, quantify trends, support ongoing investigations, and strengthen detection and response capabilities
  • Conduct in-depth technical analysis (searching, pivoting, enrichment) to support Threat Hunting and identify potential intrusions in Bosch networks and systems
  • Collaborate closely with cross-functional teams including Incident Response and Detection Engineering to integrate intelligence into detection and response workflows
  • Produce and deliver high-quality intelligence reports, briefings, and presentations tailored to technical, business, and executive audiences
  • Respond to Requests for Information (RFIs) and brief stakeholders on emerging campaigns and significant incidents
  • Develop and improve internal tools for threat analysis and monitoring (using Python, REST APIs, Git, Docker)

Requirements:

  • Bachelor's degree in Computer Science, Cybersecurity, or a related field
  • Several years of experience in a technical cybersecurity role (e.g., CTI, SOC, Threat Hunting, Incident Response, DFIR)
  • Proven expertise in tracking and analyzing adversarial behavior, with strong knowledge of the cyber kill chain and MITRE ATT&CK framework
  • Ability to work methodically and independently while being an effective and reliable team player in a distributed team
  • Excellent communication skills with the ability to translate complex technical findings for diverse stakeholders
  • Strong scripting and tool development experience (Python, APIs, Git, Docker)
  • Fluent in English
  • German is a plus

Nice to have:

German language skills

What we offer:
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Number of benefits for families (for instance summer camps for kids)
  • Non-working day on the 31st of December

Additional Information:

Job Posted:
July 18, 2025

Employment Type:
Fulltime
Work Type:
Hybrid work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Senior Cybersecurity Expert (Threat Intelligence)

Senior Cybersecurity Expert

At Bosch, we shape the future by inventing high-quality technologies and service...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field
  • Several years of experience in a technical cybersecurity role (e.g., CTI, SOC, Threat Hunting, Incident Response, DFIR)
  • Proven expertise in tracking and analyzing adversarial behavior, with strong knowledge of the cyber kill chain and MITRE ATT&CK framework
  • Ability to work methodically and independently while being an effective and reliable team player in a distributed team
  • Excellent communication skills with the ability to translate complex technical findings for diverse stakeholders
  • Strong scripting and tool development experience (Python, APIs, Git, Docker)
  • Fluent in English
  • German is a plus.
Job Responsibility
Job Responsibility
  • Identify, analyze, and track threat actor TTPs and IOCs using threat prioritization frameworks and threat landscape monitoring
  • Investigate complex threat data to provide situational awareness, quantify trends, support ongoing investigations, and strengthen detection and response capabilities
  • Conduct in-depth technical analysis (searching, pivoting, enrichment) to support Threat Hunting and identify potential intrusions in Bosch networks and systems
  • Collaborate closely with cross-functional teams including Incident Response and Detection Engineering to integrate intelligence into detection and response workflows
  • Produce and deliver high-quality intelligence reports, briefings, and presentations tailored to technical, business, and executive audiences
  • Respond to Requests for Information (RFIs) and brief stakeholders on emerging campaigns and significant incidents
  • Develop and improve internal tools for threat analysis and monitoring (using Python, REST APIs, Git, Docker).
What we offer
What we offer
  • Competitive salary + annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Complex environment of working, professional support and possibility to share knowledge and best practices
  • Ongoing development opportunities in a multinational environment
  • Broad access to professional trainings (incl. language courses), conferences and webinars
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Expert

Senior Cybersecurity Expert (Threat Intelligence) position at Bosch focusing on ...
Location
Location
Poland , Warszawa
Salary
Salary:
Not provided
https://www.bosch.pl/ Logo
Robert Bosch Sp. z o.o.
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field
  • Several years of experience in a technical cybersecurity role (e.g., CTI, SOC, Threat Hunting, Incident Response, DFIR)
  • Proven expertise in tracking and analyzing adversarial behavior, with strong knowledge of the cyber kill chain and MITRE ATT&CK framework
  • Ability to work methodically and independently while being an effective and reliable team player in a distributed team
  • Excellent communication skills with the ability to translate complex technical findings for diverse stakeholders
  • Strong scripting and tool development experience (Python, APIs, Git, Docker)
  • Fluent in English
Job Responsibility
Job Responsibility
  • Identify, analyze, and track threat actor TTPs and IOCs using threat prioritization frameworks and threat landscape monitoring
  • Investigate complex threat data to provide situational awareness, quantify trends, support ongoing investigations, and strengthen detection and response capabilities
  • Conduct in-depth technical analysis (searching, pivoting, enrichment) to support Threat Hunting and identify potential intrusions in Bosch networks and systems
  • Collaborate closely with cross-functional teams including Incident Response and Detection Engineering to integrate intelligence into detection and response workflows
  • Produce and deliver high-quality intelligence reports, briefings, and presentations tailored to technical, business, and executive audiences
  • Respond to Requests for Information (RFIs) and brief stakeholders on emerging campaigns and significant incidents
  • Develop and improve internal tools for threat analysis and monitoring (using Python, REST APIs, Git, Docker)
What we offer
What we offer
  • Annual bonus
  • Hybrid work with flexible working hours
  • Referral Bonus Program
  • Copyright costs for IT employees
  • Professional support and possibility to share knowledge and best practices
  • Ongoing development opportunities in a multinational environment
  • Broad access to professional trainings (incl. language courses), conferences and webinars
  • Private medical care and life insurance
  • Cafeteria System with multiple benefits (incl. MultiSport, shopping vouchers, cinema tickets, etc.)
  • Prepaid Lunch Card
  • Fulltime
Read More
Arrow Right

Senior Cybersecurity Analyst, Threat Hunter

Our cybersecurity and information security teams at IDEXX contribute to a more r...
Location
Location
United States , Westbrook, Maine
Salary
Salary:
120000.00 - 140000.00 USD / Year
idexx.com Logo
IDEXX
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 6–10 years of experience in cybersecurity roles
  • Minimum of 3 years dedicated specifically to threat hunting or advanced incident response
  • Bachelor’s degree in computer science, Cybersecurity, Information Technology, or a related field
  • Preferred certifications GCIH (GIAC Certified Incident Handler) and CompTIA CySA+ (Cybersecurity Analyst+) certification
  • Proven, hands-on experience using platform for EDR (Endpoint Detection and Response) and threat hunting
  • Expert-level knowledge of PowerShell Scripting, Python and EDR and SIEM query language is preferred
  • Deep understanding of incident response lifecycles, methodologies, and forensic techniques
  • Strong knowledge of networking protocols, operating systems (Windows, Linux, macOS), and common attack vectors
  • Familiarity with scripting languages (e.g., Python, PowerShell) for automation of hunting tasks is a plus
  • Exceptional analytical and problem-solving skills with keen attention to detail
Job Responsibility
Job Responsibility
  • Proactively hunt for indicators of compromise (IOCs) and advanced persistent threats (APTs) across the network, endpoints, and cloud environments using threat intelligence and a hypothesis-driven methodology
  • Conduct in-depth analysis of security events, network traffic, and endpoint data to identify malicious activity and potential breaches
  • Utilize the SIEM and EDR platform extensively, applying expert knowledge of the scripting, SIEM and EDR query language to perform complex searches and data analysis
  • Lead and participate in incident response activities, including containment, eradication, and recovery efforts, serving as a primary escalation point for critical security incidents
  • Develop and refine threat hunting playbooks, procedures, and detection rules to improve the security team’s efficiency and effectiveness
  • Collaborate with the security engineering and security operations center (SOC) teams to integrate new threat intelligence and enhance existing security tools and controls
  • Mentor junior analysts and contribute to the ongoing improvement of the organization's overall security posture
What we offer
What we offer
  • Opportunity for annual cash bonus
  • Health / Dental / Vision Benefits Day-One
  • 5% matching 401k
  • Additional benefits including but not limited to financial support, pet insurance, mental health resources, volunteer paid days off, employee stock program, foundation donation matching
  • Fulltime
Read More
Arrow Right

Red Team Operations Manager

To lead, oversee, and quality assure the execution of Red Team engagements end-t...
Location
Location
United Kingdom
Salary
Salary:
Not provided
bugcrowd.com Logo
Bugcrowd
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Extensive experience leading and/or managing Red Team engagements in enterprise environments, preferably across multiple industries (e.g. finance, critical infrastructure, cloud / SaaS / OT)
  • Deep technical knowledge of exploitation, post-exploitation, lateral movement, persistence, command & control, evasion, privilege escalation
  • Good knowledge and experience with Blue Team controls e.g. IDS/IPS, SIEM, EDR, NGFW, log analysis, detection engineering, ideally experience in bypassing or evading them safely
  • Solid experience with modern cloud environments (Azure, AWS, GCP), hybrid / on-premise networks, potentially OT/IoT/industrial environments
  • Strong tradecraft / OpSec awareness around how to avoid detection and conduct operations with minimal operational risk
  • Familiarity with CREST / STAR / TIBER etc. and regulatory / compliance requirements in relevant geographies
  • Proven experience in threat intelligence ingestion, scenario design, mapping to relevant threat actors
  • Excellent written and verbal communication skills and able to produce high quality reports, executive summaries, interact with senior leadership, legal, compliance etc.
  • Good project / operations management skills with an eye for budgeting, scheduling, resource allocation, interfacing external/internal teams
  • Ability to make real-time decisions under pressure, to balance risk vs reward
Job Responsibility
Job Responsibility
  • Lead, oversee, and quality assure the execution of Red Team engagements end-to-end from scoping & planning, through execution, reporting, to debrief and capability development
  • Ensure that all operations are safe, legal, technically robust, aligned with threat intelligence, compliance frameworks, and deliver high value to customers
  • Act as a subject-matter expert and manager for both operations and sales / client-facing aspects of Red Team services
  • Lead multiple concurrent Red Team engagements across industries
  • Define, negotiate and document scope, objectives, rules of engagement, deliverables, constraints, escalation & approval pathways
  • Oversee milestone planning e.g. kick-offs, stand-ups, wash-ups, strategic debriefs
  • Manage resources e.g. operator assignments, tooling, support functions
  • Track engagement progress vs objectives, adjust as needed
  • Assess and manage technical risk ensuring that any red team activity minimises risk to customer operations, data, systems
  • Real-time decision making during operations around TTP deployment, bypass of defenses, managing detections or unexpected discovery
Read More
Arrow Right

Red Team Operations Manager

To lead, oversee, and quality assure the execution of Red Team engagements end-t...
Location
Location
Australia
Salary
Salary:
Not provided
bugcrowd.com Logo
Bugcrowd
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Extensive experience leading and/or managing Red Team engagements in enterprise environments, preferably across multiple industries (e.g. finance, critical infrastructure, cloud / SaaS / OT)
  • Deep technical knowledge of exploitation, post-exploitation, lateral movement, persistence, command & control, evasion, privilege escalation
  • Good knowledge and experience with Blue Team controls e.g. IDS/IPS, SIEM, EDR, NGFW, log analysis, detection engineering, ideally experience in bypassing or evading them safely
  • Solid experience with modern cloud environments (Azure, AWS, GCP), hybrid / on-premise networks, potentially OT/IoT/industrial environments
  • Strong tradecraft / OpSec awareness around how to avoid detection and conduct operations with minimal operational risk
  • Familiarity with CREST / STAR / TIBER etc. and regulatory / compliance requirements in relevant geographies
  • Proven experience in threat intelligence ingestion, scenario design, mapping to relevant threat actors
  • Excellent written and verbal communication skills and able to produce high quality reports, executive summaries, interact with senior leadership, legal, compliance etc.
  • Good project / operations management skills with an eye for budgeting, scheduling, resource allocation, interfacing external/internal teams
  • Ability to make real-time decisions under pressure, to balance risk vs reward
Job Responsibility
Job Responsibility
  • Lead multiple concurrent Red Team engagements across industries
  • Define, negotiate and document scope, objectives, rules of engagement, deliverables, constraints, escalation & approval pathways
  • Oversee milestone planning e.g. kick-offs, stand-ups, wash-ups, strategic debriefs
  • Manage resources e.g. operator assignments, tooling, support functions
  • Track engagement progress vs objectives, adjust as needed
  • Assess and manage technical risk ensuring that any red team activity minimises risk to customer operations, data, systems
  • Real-time decision making during operations around TTP deployment, bypass of defenses, managing detections or unexpected discovery
  • Review and approve attack plans, threat modelling, intelligence
  • Ensure operators employ strong operational security (OpSec), safe tradecraft, evidence collection, clean up post-engagement
  • Maintain up-to-date knowledge of Red Team tools, adversary TTPs, defensive controls, detection systems
Read More
Arrow Right

Senior Cybersecurity Specialist

Seeking a Senior Cybersecurity Specialist that is able to work with a dynamic te...
Location
Location
United States , Boston
Salary
Salary:
Not provided
mcdean.com Logo
M.C. Dean, Inc
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Top Secret clearance with the ability to obtain
  • U.S. Citizenship
  • Bachelor’s Degree in Computer Science, Engineering, Information Technology, or Cybersecurity Discipline preferred
  • 12+ years of demonstrated experience in Information Security
  • Good working knowledge of both DoD and Federal Government Cybersecurity/Information Assurance Security policies and procedures
  • 9+ years of applicable experience with a Master's Degree
  • 15+ years of applicable experience with an Associate's Degree
  • Demonstrated experience leading Cybersecurity Teams
  • Demonstrated experience with combined Risk Management Framework (RMF) and/or other system authorization and accreditation processes and NIST 800-53 controls
  • Demonstrated experience accrediting systems using Enterprise Mission Assurance Support Service (eMASS)/Xacta or similar, McAfee Host Based Security System (HBSS) or similar, and Nessus
Job Responsibility
Job Responsibility
  • Manage a team of engineers, analysts, and cybersecurity specialists
  • Be the contract Subject Matter Expert (SME) all matters related to Cybersecurity and the Risk Management Framework (RMF), and cyber compliance/tools (e.g., eMASS/XACTA, Nessus, HBSS, Splunk, etc.)
  • Drive team awareness of newly emerging Department of Defense cyber requirements
  • Bring forward suggestions on potential new cybersecurity related tools that will drive automation of team processes
  • Ensure Risk Assessments, Exemption/Exception requests and RMF Packages meet compliance
  • Ensure team is monitoring, reporting, and assessing Cyber compliance for all Operations and Infrastructure on schedule and in accordance with government policies
  • Ensure team maintenance, monitoring, reporting, and assessment of Cyber compliance on all security tools and technology
  • Ensure team is monitoring, reporting, and assessment of Cyber internal and external policy compliance
  • Work to mitigate risk across security system’s infrastructure
  • Interface daily with program management, operations, and engineers leads
What we offer
What we offer
  • Medical, dental, vision, life, and disability insurance
  • Paid time off
  • Tuition reimbursement
  • 401k Retirement Plan
  • Military Reserve pay offset
  • Paid maternity leave
  • Professional and technical training programs
  • Leadership training
  • Fulltime
Read More
Arrow Right

Cybersecurity Business Development and Partnership Manager

We are seeking an experienced and dynamic Senior Cybersecurity Business Developm...
Location
Location
United States
Salary
Salary:
130500.00 - 300000.00 USD / Year
https://www.hpe.com/ Logo
Hewlett Packard Enterprise
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years of experience in business development, technology partnerships, or sales within the cybersecurity industry
  • Strong understanding of cybersecurity concepts, technologies, products, and services, including areas like SASE, Zero Trust, threat intelligence, endpoint security, cloud security, and network protection
  • Proven ability to develop and execute strategic plans, identify market opportunities, and drive revenue growth
  • Exceptional skills in establishing and nurturing relationships with partners, clients, and stakeholders
  • Excellent written, verbal, and presentation skills, with the ability to articulate complex cybersecurity solutions to technical and non-technical audiences
  • Bachelor’s degree in cybersecurity, computer science, business management, or a related field. Advanced degree or certifications are a plus
Job Responsibility
Job Responsibility
  • Develop and execute a comprehensive business development strategy to identify and pursue new revenue opportunities in the cybersecurity market
  • Conduct market research to understand emerging trends, customer needs, and competitive landscapes
  • Identify and prioritize target clients, industries, and sectors for expansion, including enterprise, government, and SMB markets
  • Build and maintain strategic relationships with technology partners, including software vendors, hardware providers, cloud service providers, and integrators
  • Collaborate with partners to co-develop innovative cybersecurity solutions that address customer needs and drive mutual business success
  • Act as the primary point of contact for partner engagement, ensuring alignment on shared goals, joint marketing activities, and go-to-market strategies
  • Evaluate potential partnerships and alliances to ensure alignment with organizational goals and technical capabilities
  • Work closely with cross-functional teams (Product, Engineering, Marketing, Sales) to align business development initiatives with company objectives
  • Identify and execute opportunities for expanding the company’s cybersecurity technology portfolio through partnerships, acquisitions, or licensing agreements
  • Develop and present business cases for new initiatives to senior leadership, including financial forecasts, ROI analyses, and risk assessments
What we offer
What we offer
  • Health & Wellbeing
  • Personal & Professional Development
  • Unconditional Inclusion
  • Competitive salary package
  • Performance-based incentives
  • Professional growth opportunities
  • Fulltime
Read More
Arrow Right

Principal Business Development Manager

As a Principal Business Development Manager for Unit 42, you'll be the strategic...
Location
Location
France , Paris
Salary
Salary:
Not provided
paloaltonetworks.it Logo
Palo Alto Networks Italia
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years of extensive and progressive experience in Business Development and Sales leadership roles within the cybersecurity industry
  • A consistent and demonstrable track record of significantly exceeding multi-million dollar sales quotas as a Major/Large Account Manager, Regional Sales Manager, or Enterprise Seller, with a strong focus on F1000 accounts
  • At least 10 years of experience selling complex Security solutions or services, including a profound understanding and proven success in: Offensive Security Services, Incident Response Retainers, Risk Management Services, SOC Assessment Services, Threat Intelligence Services
  • A profound understanding of global channel partners and a proven ability to strategically leverage a channel-centric go-to-market approach
  • Mastery of MEDDIC (or similar rigorous sales methodologies) and Complex Solution Sales
  • In-depth knowledge of how specific industries leverage security solutions
  • Executive presence and communication skills to succinctly translate complex technical benefits into high-leverage business outcomes
  • A demonstrated passion for the cybersecurity space, a proactive and entrepreneurial mindset
  • Fluent in English, with additional regional language proficiency (e.g., Arabic, Spanish, French, German) a significant plus
Job Responsibility
Job Responsibility
  • Pioneering New Business & Strategic Growth: Proactively identify, generate, and qualify new opportunities, developing and executing comprehensive account and regional strategies
  • Empowering Core Sales Teams: Serve as a trusted expert and strategic partner to Palo Alto Networks Core sales organizations and channels
  • Negotiating & Closing Complex Engagements: Scope, negotiate, and close sophisticated enterprise contracts
  • Building Executive Relationships & Market Presence: Establish and cultivate strong relationships with C-level executives and senior decision-makers (CISO, CSO, CIO)
  • Cross-Functional & Partner Collaboration: Collaborate seamlessly with internal stakeholders (Field Sales, Marketing, Sales Operations, etc.) and leverage strategic regional partners
  • Strategic Forecasting & Reporting: Maintain precise account intelligence and provide accurate forecasts of business opportunities in SFDC
What we offer
What we offer
  • FLEXBenefits wellbeing spending account with over 1,000 eligible items selected by employees
  • mental and financial health resources
  • personalized learning opportunities
  • Fulltime
Read More
Arrow Right