This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
We’re building a world of health around every individual — shaping a more connected, convenient and compassionate health experience. At CVS Health®, you’ll be surrounded by passionate colleagues who care deeply, innovate with purpose, hold ourselves accountable and prioritize safety and quality in everything we do. Join us and be part of something bigger – helping to simplify health care one person, one family and one community at a time. CVS Health is hiring a Staff Threat Researcher and Intelligence Engineer within CVS Health’s Cyber Threat Intelligence (CTI) team that is responsible for all phases of cyber security intelligence (collection, analysis, production and dissemination) and tasked with identifying increasingly sophisticated cyber-attacks; monitoring the tactics, techniques and procedures of threat actors and establishing motives that could impact company resources. This intelligence is then leveraged to actively hunt for adversary activity targeting CVS Health’s computing environment. In this role, you will lead advanced research initiatives targeting sophisticated cyber threats, architect and implement innovative solutions for threat intelligence collection, analysis, and automation, with a particular emphasis on coding and engineering. Your work will drive the development of new methodologies for identifying, tracking, and mitigating adversary activity, leveraging deep technical expertise and advanced programming skills. You will also foster collaboration with the broader intelligence community, law enforcement, and industry partners to enhance CVS Health’s security posture.
Job Responsibility:
Lead the design and development of advanced threat research platforms and prototypes, focusing on automation and scalable intelligence workflows
Architect and code solutions for collecting, processing, and analyzing diverse threat data sources, including telemetry, commercial feeds, and OSINT
Conduct in-depth research on emerging threat actors, tactics, techniques, and procedures (TTPs), including dark net intelligence gathering, and produce actionable reports for stakeholders
Engineer and automate the intelligence cycle, continuously improving processes for detection, alerting, and incident enrichment using SIEM, SOAR, and EDR technologies
Mentor and guide team members in advanced coding practices, threat research methodologies, and engineering best practices
Develop and present technical briefings, research papers, and position documents to executive leadership and external partners
Requirements:
7+ years of experience in threat intelligence research, including advanced collection and analysis methodologies, threat actor profiling, and MITRE ATT&CK techniques
7+ years of experience in SIEM, SOAR, and EDR tools, both open source and commercial
6+ years of experience in scripting and programming languages (e.g., Python, PowerShell, Go) for automating threat intelligence workflows and building research tools
5+ years of experience architecting and coding threat intelligence platforms and research environments
5+ years of experience in engineering solutions for large-scale data analysis, including security logs, product telemetry, and open-source intelligence
3+ years of experience in producing and presenting high-impact threat research reports and technical briefings to diverse audiences
Bachelor’s degree from accredited university or equivalent work experience (HS diploma + 4 years relevant experience)
Nice to have:
Experience leading the development and automation of threat intelligence and research platforms at scale
Subject matter expertise in retail and healthcare threat intelligence, with a focus on coding and research innovation
Advanced experience in dark net intelligence collection, threat actor research, and prototype development for new detection capabilities
Demonstrated ability to produce and present high-impact threat research reports and technical briefings to diverse audiences
Deep familiarity with SIEM, SOAR, and EDR tools, both open source and commercial
Proficiency in applying machine learning techniques to threat research, including experience with model development, feature engineering, and deployment for security analytics and anomaly detection
What we offer:
Affordable medical plan options
401(k) plan (including matching company contributions)
Employee stock purchase plan
No-cost programs for all colleagues including wellness screenings, tobacco cessation and weight management programs, confidential counseling and financial coaching