CrawlJobs Logo

Threat Intelligence Research Engineer

threatlocker.com Logo

ThreatLocker

Location Icon

Location:
United States , Orlando

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

Not provided

Job Description:

We’re looking for a Threat Intelligence Research Engineer who can bridge two worlds: deep cybersecurity expertise and clear, authoritative communication. In this role, you will analyze real-world threats, uncover emerging attacker behaviors, and translate complex technical findings into high-impact reports, briefs, and articles that educate and empower cybersecurity professionals. You will work at the intersection of engineering, research, and brand thought leadership, turning raw intelligence into content that drives awareness, supports our product narrative, and strengthens our authority within the cybersecurity community.

Job Responsibility:

  • Monitor, analyze, and report on emerging threats, indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs), and global threat trends
  • Investigate vulnerabilities, misconfigurations, malware behavior, ransomware campaigns, and exploit chains
  • Conduct independent research on threat actors, intrusion patterns, and security gaps relevant to our customer base
  • Collaborate with internal engineering, SOC, and threat teams to access proprietary intelligence and validate findings
  • Produce clear, defensible, and high-accuracy analysis based on data and technical evidence
  • Transform threat research into high-quality reports, whitepapers, blogs, briefs, advisories, and thought-leadership content
  • Write in a way that resonates with cybersecurity professionals, executives, and IT leaders
  • Contribute to articles under the names of internal subject matter experts (SMEs) to elevate their voices and strengthen company authority
  • Develop clear visuals, diagrams, and technical explanations to support complex research
  • Ensure all content is technically rigorous, original, and aligned with our Zero Trust security philosophy
  • Work with the SVP of Brand Marketing to shape the company’s editorial direction on threat intelligence topics
  • Support media, PR, and analyst engagements with accurate intelligence and expert insights
  • Participate in webinars, research discussions, and cross-team reviews to maintain accuracy and consistency
  • Help position the company as a trusted voice in cybersecurity through data-driven storytelling

Requirements:

  • 5+ years in cybersecurity research, threat intelligence, security engineering, SOC analysis, or malware analysis
  • Strong knowledge of attacker TTPs, MITRE ATT&CK, malware behavior, incident response, and threat hunting workflows
  • Hands-on familiarity with tools such as SIEMs, sandboxes, EDR platforms, packet analyzers, and OSINT frameworks
  • Ability to read logs, investigate incidents, and interpret technical artifacts
  • Proven experience writing technical reports, threat advisories, security research, or cybersecurity analysis
  • Ability to translate complex material into clear, concise content without losing technical accuracy
  • Strong editorial judgment and an understanding of narrative clarity and structure
  • Deep curiosity and a research-driven mindset
  • Commitment to accuracy, integrity, and evidence-backed analysis
  • Ability to juggle multiple research topics while meeting publishing deadlines
  • A collaborative mindset and willingness to work across engineering, security, and marketing teams

Additional Information:

Job Posted:
December 13, 2025

Work Type:
On-site work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Threat Intelligence Research Engineer

Threat Intelligence Analyst

As a Threat Analyst at UpGuard, you will be an integral member of our Threat Sca...
Location
Location
United States , Chicago
Salary
Salary:
120000.00 USD / Year
https://www.upguard.com Logo
UpGuard
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Expertise in Open Source Intelligence: Strong understanding of OSINT methodologies with a focus on the open, deep, and dark web
  • Understanding of Software Development: Solid grasp of software development processes to deconstruct and interpret vulnerability disclosures effectively
  • Cross-Team Collaboration: Excellent communication skills to work with the Customer Success & Support teams, explaining capabilities and resolving customer issues
  • Independence and Initiative: A self-starter attitude with the ability to take ownership of tasks and drive them to completion independently or collaboratively
  • Technical Skills in Scripting: Proficiency in scripting languages such as Python, with the ability to learn and adapt to new programming languages as needed
Job Responsibility
Job Responsibility
  • Analyze Data Leaks: Process and assess incoming data feeds to identify whether customers have been impacted by data leaks
  • Contribute to Threat Intelligence Feeds: Enhance UpGuard’s proprietary threat intelligence feeds by researching and integrating new findings
  • Develop Vulnerability Detections: Build new product and vulnerability detections by reverse-engineering applications, analyzing vulnerability disclosures, and creating robust detection methodologies
  • Conduct Open Source Intelligence (OSINT) and Security Research: Focus heavily on identifying, analyzing, and interpreting open-source intelligence across the open, deep, and dark web to identify risks and vulnerabilities
What we offer
What we offer
  • Monthly Lifestyle subsidy: use this for financial, physical, and mental wellbeing
  • WFH set-up allowance: to ensure you have the right environment to work in, we will help you get set up within your first 3 months at UpGuard
  • $1,500 USD annual Learning & Development allowance: to support your career development all team members will be able to expense development opportunities against this allowance
  • Generous Annual Leave/PTO allowances: time to recharge your batteries
  • 18 weeks paid Parental Leave: irrespective of parenting role
  • Personal Leave allowance: this includes sick & carer’s leave
  • Fully remote working environment: while we have physical offices in Sydney & Hobart, we do not mandate compulsory attendance
  • Top-spec hardware: all team members will be provided with top-spec laptops for their roles
  • Personal device security & online privacy protection subsidy: UpGuard provides team members with a paid subscription to personal device security & online privacy protection platform
  • Generative AI subsidy: UpGuard provides paid subscriptions for all team members to access generative AI tools to support their work
  • Fulltime
Read More
Arrow Right

Staff Threat Researcher and Intelligence Engineer

We’re building a world of health around every individual — shaping a more connec...
Location
Location
United States , Work at Home
Salary
Salary:
130295.00 - 260590.00 USD / Year
https://www.cvshealth.com/ Logo
CVS Health
Expiration Date
March 31, 2026
Flip Icon
Requirements
Requirements
  • 7+ years of experience in threat intelligence research, including advanced collection and analysis methodologies, threat actor profiling, and MITRE ATT&CK techniques
  • 7+ years of experience in SIEM, SOAR, and EDR tools, both open source and commercial
  • 6+ years of experience in scripting and programming languages (e.g., Python, PowerShell, Go) for automating threat intelligence workflows and building research tools
  • 5+ years of experience architecting and coding threat intelligence platforms and research environments
  • 5+ years of experience in engineering solutions for large-scale data analysis, including security logs, product telemetry, and open-source intelligence
  • 3+ years of experience in producing and presenting high-impact threat research reports and technical briefings to diverse audiences
  • Bachelor’s degree from accredited university or equivalent work experience (HS diploma + 4 years relevant experience)
Job Responsibility
Job Responsibility
  • Lead the design and development of advanced threat research platforms and prototypes, focusing on automation and scalable intelligence workflows
  • Architect and code solutions for collecting, processing, and analyzing diverse threat data sources, including telemetry, commercial feeds, and OSINT
  • Conduct in-depth research on emerging threat actors, tactics, techniques, and procedures (TTPs), including dark net intelligence gathering, and produce actionable reports for stakeholders
  • Engineer and automate the intelligence cycle, continuously improving processes for detection, alerting, and incident enrichment using SIEM, SOAR, and EDR technologies
  • Mentor and guide team members in advanced coding practices, threat research methodologies, and engineering best practices
  • Develop and present technical briefings, research papers, and position documents to executive leadership and external partners
What we offer
What we offer
  • Affordable medical plan options
  • 401(k) plan (including matching company contributions)
  • Employee stock purchase plan
  • No-cost programs for all colleagues including wellness screenings, tobacco cessation and weight management programs, confidential counseling and financial coaching
  • Paid time off
  • Flexible work schedules
  • Family leave
  • Dependent care resources
  • Colleague assistance programs
  • Tuition assistance
  • Fulltime
Read More
Arrow Right

Senior Product Manager – Threat Detection

As a Product Manager – Threat Detection, you will be responsible for driving the...
Location
Location
United States
Salary
Salary:
182000.00 - 219000.00 USD / Year
https://corelight.com/ Logo
Corelight
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 2+ years in a technical support, engineering, or security research role
  • 3+ years in networking in a product or practitioner role
  • 5+ years overall experience in cybersecurity, with a focus on network security and threat detection
  • Strong understanding of network protocols, network security principles, and intrusion detection methodologies
  • Experience with Zeek (Bro) and its applications within NDR and security operations
  • Experience with network forensics, packet analysis, and network-based anomaly detection
  • Strong analytical skills, with the ability to interpret and apply threat intelligence and attack frameworks (e.g., MITRE ATT&CK)
  • Bachelor's degree in Computer Science, Computer Engineering, Cybersecurity, or equivalent experience
Job Responsibility
Job Responsibility
  • Develop and maintain a cutting edge detection engineering program via collaboration with Corelight Labs Research
  • Execute the product strategy for Corelight’s threat detection capabilities
  • Research adversary tactics, emerging network threats, and novel detection methodologies to improve the effectiveness of Corelight’s NDR solutions
  • Work closely with threat researchers, SOC analysts, and detection engineers to develop high-fidelity detection logic and optimize network threat intelligence
  • Analyze network protocols and traffic patterns to identify new ways to extract valuable security-relevant insights
  • Collaborate with engineering, UX, and security research teams to develop new features and improve the usability of Corelight’s threat detection tools
  • Contribute to open-source security initiatives, representing Corelight in the broader security community and helping drive innovation
  • Act as a technical liaison between customers, security teams, and internal stakeholders to ensure Corelight remains the gold standard for network evidence collection
  • Define, prioritize, and refine product requirements for threat detection capabilities, integrations, and intelligence applications
  • Develop detection content, documentation, and best practices for leveraging Corelight’s platform in threat hunting and incident response workflows
What we offer
What we offer
  • Equity
  • Additional benefits
  • Collaborative, inclusive, and growth-oriented culture
  • AI-assisted workflows
  • Machine learning models
  • Cloud security and SaaS-based solutions
  • Geographically distributed yet connected employee base
  • Fulltime
Read More
Arrow Right

Senior Security Graph Engineer

The Defender Experts (DEX) Research team is at the forefront of Microsoft’s thre...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4+ years of experience in security research, detection engineering, threat lifecycle, cloud security in large-scale in complex cloud environments
  • Strong understanding of graph theory, graph databases (e.g., Neo4j, TigerGraph), and graph analytics with proficiency in Python or similar languages for data analysis and prototyping
  • Experience working with large-scale datasets, distributed systems and graph analytics projects
  • Ability to translate complex threat data into graphs and actionable insights
  • Experience with machine learning or statistical modelling applied to graph data
  • Proven ability to lead and execute advanced research on emerging cloud-based threats affecting both Microsoft and third-party security products across heterogeneous cloud environments
  • Knowledge of adversary infrastructure tracking, malware analysis, or campaign clustering
  • Extensive hands-on experience with cloud platforms—including, but not limited to, Azure—as well as a deep understanding of multi-cloud security challenges and solutions
  • B. Tech or Equivalent
Job Responsibility
Job Responsibility
  • Design and maintain scalable threat graphs that model entities such as devices, identity, threat actors, TTPs, infrastructure, and campaigns
  • Lead and execute advanced research to develop algorithms and heuristics to detect malicious patterns and relationships within graph data on emerging cloud-based threats impacting Microsoft and third-party security products across heterogeneous cloud environments
  • Collaborate with threat protection researchers, data scientists, and detection engineers to enrich graph models with contextual insights and refine detection and response strategies, to provide comprehensive threat coverage and response capabilities
  • Research and prototype novel graph-based techniques for threat detection, attribution, and prioritization in collaboration with internal and external security teams
  • Translate complex raw security data into actionable graph intelligence that enhances the effectiveness of security operations for a global customer base
  • Mentor, guide, and drive best practices among researchers and detection engineers on advanced graph-based threat hunting and incident response across diverse ecosystems
  • Contribute to industry knowledge and Microsoft’s security posture by publishing research, developing threat graph models, and proactively identifying threats and attack trends in the cloud
  • Fulltime
Read More
Arrow Right

Senior Security Engineer, Threat Intelligence

As a Senior Security Engineer specializing in Threat Intelligence on the Detecti...
Location
Location
United States; Canada
Salary
Salary:
156000.00 - 210000.00 USD; CAD / Year
https://www.1password.com Logo
1Password
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in technical security engineering roles
  • 3+ years focused on threat intelligence
  • Strong understanding of modern attacker TTPs, including cloud-native, SaaS, identity-focused, and insider-adjacent threat patterns
  • Experience developing intelligence requirements, prioritization frameworks, analysis workflows, and emulation scenarios
  • Hands-on experience with scripting or automation (e.g., Python, APIs, SOAR workflows) to improve operational efficiency and cross-team execution
  • Ability to produce concise, high-quality written intelligence, including executive-level summaries
  • Familiarity with security telemetry, logs, and investigative workflows used by detection and response teams
  • Willingness to participate in an on-call rotation and support security incidents during high-severity or off-hours events
Job Responsibility
Job Responsibility
  • Research, track, and assess the threat landscape by analyzing relevant threat actors, campaigns, and behaviors affecting 1Password’s attack surface, identity systems, brand, third-party ecosystem, and insider risk scenarios
  • Analyze and prioritize information to develop actionable intelligence that informs detection coverage, hunting activities, and response readiness
  • Partner with Detection Engineering to design and validate threat-based detections, including through adversary emulation, simulation, or controlled testing
  • Use automation and scripting to improve how threat intelligence is collected, enriched, distributed, and actioned across Security workflows
  • Curate and deliver threat intelligence reporting for both technical teams and executive stakeholders
  • Build and maintain repeatable threat intelligence processes, workflows, and documentation that scale with the Detection & Response program
  • Participate directly in security operations by triaging alerts, supporting investigations, managing incidents, and contributing to post-incident learning
What we offer
What we offer
  • Health benefits
  • Dental benefits
  • 401k/RRSP
  • Generous paid time off
  • Equity grant
  • Participation in incentive programs
  • Maternity and parental leave top-up programs
  • RSU program for most employees
  • Retirement matching program
  • Free 1Password account
  • Fulltime
Read More
Arrow Right

Security and Application Security Engineer

Beacon Technologies is seeking a Security and Application Security Engineer. The...
Location
Location
United States , Las Vegas
Salary
Salary:
Not provided
beacontechinc.com Logo
Beacon Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Minimum of five years of Information Security experience with at least two years of application-level security
  • Strong communication skills: ability to convey and document security guidelines, requirements, and coding best practices
  • Familiarity with Security Best Practices in common coding languages
  • Application Penetration Testing / API Security Testing
  • Software Development Life Cycle Design and Implementation
  • Static and Dynamic Application Testing Tools and Methods
  • Container and orchestration security (Kubernetes, Docker, Octopus, GitHub, etc.)
  • Familiarity with Application Security Testing Frameworks such as OWASP
  • Strong logical and analytical thinker
  • exceptional skills in security systems solutions
Job Responsibility
Job Responsibility
  • Operate as a liaison between the Security Team and the Development Teams
  • Preserve PCI and SOX Security Certification programs with a primary focus on ensuring compliance with the appropriate industry standards and security controls
  • Supporting incident response and architecture review whenever applications security expertise is needed
  • Integrating threat modeling practices into the SDLC
  • Work with other staff to perform periodic scans and evaluation of system security including areas such as patch management, penetration testing, vulnerability assessments, and other types of InfoSec-related tasks
  • Assist in identifying and communicating security exposures, information security incidents or non-compliance situations to IT management or the CISO as appropriate. Duties may also include collecting and documenting cyber security and incident response event data as necessary.
What we offer
What we offer
  • Career advancement opportunities
  • extensive training
  • excellent benefits including paying for health and dental premiums for salaried employees.
  • Fulltime
Read More
Arrow Right

Chief Cybersecurity Solutions Officer

Loginsoft is a renowned provider of cybersecurity engineering services, speciali...
Location
Location
United States , Washington, DC
Salary
Salary:
Not provided
loginsoft.com Logo
Loginsoft
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10-15 years in technology solutions and engineering services, with 7-10 years in delivering effective cybersecurity solutions
  • Strong background in solution development, user research, and agile environments
  • Deep industry knowledge essential for strategic vision and planning
  • Proficient in impactful presentations, deal negotiation, and building client relationships
  • Effective representation of customer and end-user voices
  • Strong in developing simplified marketing content
  • Demonstrate leadership to effectively lead cross-functional teams, drive collaboration, and foster cross-functional teamwork, communication, and effective leadership
  • Demonstrate deal-closing expertise and stakeholder collaboration
  • Showcase familiarity with emerging cybersecurity tech for a visionary roadmap
  • Possess strategic thinking, entrepreneurial spirit, and strong understanding of the cybersecurity marketplace, including buyer and end-user priorities, with research, feedback, and effective communication skills
Job Responsibility
Job Responsibility
  • Cybersecurity Leadership and Roadmap Development: Lead and leverage expertise in threat intelligence, vulnerability management, cloud security, threat hunting, and threat detection. Address client pain points, stay informed on research, emerging technologies, and industry trends. Shape the cybersecurity solutions roadmap, evaluating emerging technology applications and their impact on partnerships, pricing, and planning. Foster a shared vision and advocate for the customer perspective throughout development, delivery, and deployment
  • Cybersecurity Engineering Services Growth and Adoption: Drive the growth and adoption of cybersecurity engineering services by driving penetration of existing solutions in the existing markets / cybersecurity product companies, and extending solutions to enterprise companies, delivering talented engineering resources and customized offerings. Collaborate with the CRO and CTO to align revenue generation efforts and customer satisfaction goals. Ensure the viability, feasibility, and desirability of security services by leveraging cybersecurity experience and industry knowledge. Gain comprehensive insights into the cybersecurity industry, including offerings, tools, major players, and trends. Work closely with stakeholders to fuel revenue growth and champion the customer's voice
  • Client Engagement and Relationship Management: Serve as a key point of contact for new clients / customers, collaborating with the CRO and CTO to deliver compelling presentations, lead negotiations, and align revenue goals with client expectations. Build and nurture lasting client relationships through effective communication, understanding their needs, and ensuring customer satisfaction. Represent the voice of the customer, working closely with stakeholders, including the CRO and CTO, to drive revenue growth and maintain strong partnerships
  • Strategic Partnerships and Collaborations: Forge strategic partnerships and collaborations by establishing strong relationships with industry stakeholders, fostering collaboration, and creating opportunities for joint initiatives and market expansion. Collaborate with marketing and communications teams to develop impactful content and messaging that effectively communicates the value and benefits of cybersecurity engineering services
  • Thought Leadership and Innovation: Provide thought leadership and innovation in the cybersecurity industry by staying informed about research advancements, emerging technologies, and industry trends. Identify opportunities to leverage existing innovations and invest in new ideas to deliver valuable cybersecurity solutions. Utilize deep knowledge of the industry, customers, and end-users to predict the future, define roadmaps, and position the cybersecurity solutions and the company as a leader in the market. Actively engage on LinkedIn and other social media platforms to promote our services and participate in industry forums as a speaker to drive industry recognition and engagement
  • Deal Closing and Strategic Collaboration: Collaborate with stakeholders, including the CTO, CRO, partners, and clients, to align strategies with market trends and customer needs. Drive the efforts to close deals by capitalizing on the abundant leads and opportunities we receive. Conduct research and gather feedback to define the vision, goals, and roadmap for cybersecurity solutions. Provide strategic guidance for business development, leveraging your expertise in successful deal closures. Foster cross-functional collaboration to bring industry-leading cybersecurity solutions to market, driving adoption, and ensuring successful outcomes
  • Fulltime
Read More
Arrow Right

Threat Analyst

Socket is looking for a Threat Analyst to join our growing Threat Research Team....
Location
Location
United States
Salary
Salary:
115000.00 - 150000.00 USD / Year
socket.dev Logo
Socket
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 3+ years of work experience and a master’s degree in computer science, engineering, or a related field (or equivalent experience)
  • Technical experience across several areas of security operations, including investigations, incident response and management, digital forensics, malware analysis, reverse engineering, threat intelligence, threat hunting, and detection engineering
  • Excellent communication skills and the ability to assess the relevance and impact of threats
  • Experience building tools for automation, data collection, and threat hunting
  • Passion for open source and code
Job Responsibility
Job Responsibility
  • Analyze numerous unique threats daily, maintaining a standard of quality that sets the industry benchmark for supply chain security
  • Author high-impact technical blog posts on malicious open source code packages and extensions, and publish deep-dive research pieces on malicious campaigns, threat actor profiles, novel attack vectors, and ecosystem-wide trends
  • Design and build automated scripts and tools to streamline malware analysis, enhancing our data collection, threat analysis, and threat hunting workflows
  • Partner with our engineering team to integrate your research into our core product, turning manual insights into scalable, real-time protection
  • Leverage expertise in open source software ecosystems to enhance security across package registries, browser extensions (Chrome/VS Code), and proactively monitor GitHub/GitLab for emerging malicious campaigns
  • Track APT (Advanced Persistent Threat) adversaries, characterizing various TTPs (Tactics, Techniques, and Procedures), capabilities, infrastructure, and campaigns
What we offer
What we offer
  • Equity
  • Health insurance
  • Vacation time
  • Holidays
  • Paid parental leave
  • Market competitive salary bands
  • Meaningful equity program
  • Comprehensive health benefits for you and your family
  • Flexible time-off, holidays, and winter shutdown to rest & recharge
  • Paid parental leave
  • Fulltime
Read More
Arrow Right