CrawlJobs Logo

Threat Intelligence Researcher (Cloud)

wiz.io Logo

Wiz

Location Icon

Location:
United States

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

160000.00 - 220000.00 USD / Year

Job Description:

Come join the company that is reinventing cloud security and empowering businesses to thrive in the cloud. As the fastest-growing startup ever, Wiz is on a mission to help organizations secure cloud environments that will accelerate their businesses. Trusted by security teams all over the world, we have a proven track record of success and a culture that values world-class talent. We're looking for a Threat Intelligence Researcher (Cloud) to join the Threat Research team and spread the power of Wiz. In this role, you will track, analyze and report on the most advanced threats targeting cloud environments. We are aiming to hire a cyber espionage specialist and a cyber crime specialist.

Job Responsibility:

  • Identify, analyze, and track advanced state-backed or/and financially motivated attackers that target cloud ecosystems
  • Hunt through a wide range of data sources to identify malicious campaigns targeting Wiz customers
  • Leverage open and closed-data to track the infrastructure and malware used by advanced actors
  • Investigate and attribute incidents, campaigns, and threat actors to understand more about the attackers and what motivates them
  • Communicate novel findings to multiple audiences, including customers and the public

Requirements:

  • 5+ years of experience in security or threat research, with a focus on either advanced state-backed actors or sophisticated financially motivated campaigns
  • proven track record of tracking sophisticated threat actors
  • Ability to find novel and durable ways of identifying and tracking threat actors across multiple data sets
  • Deep subject matter expertise in at least one actor tracking mechanism (malware, infrastructure, etc)
  • Experience working with large-scale telemetry, especially infrastructure hunting and by pivoting through query languages and scripting
  • Familiarity with malware analysis and using YARA to hunt for malware
  • Willingness to take on multiple roles to build out actor tracking

Nice to have:

  • Knowledge of how attackers target the major cloud and identity providers (AWS, GCP, Azure), Kubernetes, and modern cloud-native architectures
  • Experience building tools to exploit data sources in a repeatable and scalable manner
  • Track record of public communication of novel and newsworthy findings
  • Background in incident response, threat intelligence, or threat hunting
What we offer:
  • Medical, dental and vision insurance
  • Home Office Setup reimbursement
  • Flexible Spending Accounts
  • Monthly Connectivity reimbursement
  • Employee Assistance Program (EAP)
  • Short- and Long-term Disability Insurance
  • Life & Accident Insurance
  • 401(k) Retirement Savings Plan (with employer match)
  • Flexible paid time off + 11 paid holidays
  • Paid leave programs, including parental, pregnancy health, medical and bereavement leave

Additional Information:

Job Posted:
March 18, 2026

Employment Type:
Fulltime
Work Type:
Remote work
Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Threat Intelligence Researcher (Cloud)

Chief Cybersecurity Solutions Officer

Loginsoft is a renowned provider of cybersecurity engineering services, speciali...
Location
Location
United States , Washington, DC
Salary
Salary:
Not provided
loginsoft.com Logo
Loginsoft
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10-15 years in technology solutions and engineering services, with 7-10 years in delivering effective cybersecurity solutions
  • Strong background in solution development, user research, and agile environments
  • Deep industry knowledge essential for strategic vision and planning
  • Proficient in impactful presentations, deal negotiation, and building client relationships
  • Effective representation of customer and end-user voices
  • Strong in developing simplified marketing content
  • Demonstrate leadership to effectively lead cross-functional teams, drive collaboration, and foster cross-functional teamwork, communication, and effective leadership
  • Demonstrate deal-closing expertise and stakeholder collaboration
  • Showcase familiarity with emerging cybersecurity tech for a visionary roadmap
  • Possess strategic thinking, entrepreneurial spirit, and strong understanding of the cybersecurity marketplace, including buyer and end-user priorities, with research, feedback, and effective communication skills
Job Responsibility
Job Responsibility
  • Cybersecurity Leadership and Roadmap Development: Lead and leverage expertise in threat intelligence, vulnerability management, cloud security, threat hunting, and threat detection. Address client pain points, stay informed on research, emerging technologies, and industry trends. Shape the cybersecurity solutions roadmap, evaluating emerging technology applications and their impact on partnerships, pricing, and planning. Foster a shared vision and advocate for the customer perspective throughout development, delivery, and deployment
  • Cybersecurity Engineering Services Growth and Adoption: Drive the growth and adoption of cybersecurity engineering services by driving penetration of existing solutions in the existing markets / cybersecurity product companies, and extending solutions to enterprise companies, delivering talented engineering resources and customized offerings. Collaborate with the CRO and CTO to align revenue generation efforts and customer satisfaction goals. Ensure the viability, feasibility, and desirability of security services by leveraging cybersecurity experience and industry knowledge. Gain comprehensive insights into the cybersecurity industry, including offerings, tools, major players, and trends. Work closely with stakeholders to fuel revenue growth and champion the customer's voice
  • Client Engagement and Relationship Management: Serve as a key point of contact for new clients / customers, collaborating with the CRO and CTO to deliver compelling presentations, lead negotiations, and align revenue goals with client expectations. Build and nurture lasting client relationships through effective communication, understanding their needs, and ensuring customer satisfaction. Represent the voice of the customer, working closely with stakeholders, including the CRO and CTO, to drive revenue growth and maintain strong partnerships
  • Strategic Partnerships and Collaborations: Forge strategic partnerships and collaborations by establishing strong relationships with industry stakeholders, fostering collaboration, and creating opportunities for joint initiatives and market expansion. Collaborate with marketing and communications teams to develop impactful content and messaging that effectively communicates the value and benefits of cybersecurity engineering services
  • Thought Leadership and Innovation: Provide thought leadership and innovation in the cybersecurity industry by staying informed about research advancements, emerging technologies, and industry trends. Identify opportunities to leverage existing innovations and invest in new ideas to deliver valuable cybersecurity solutions. Utilize deep knowledge of the industry, customers, and end-users to predict the future, define roadmaps, and position the cybersecurity solutions and the company as a leader in the market. Actively engage on LinkedIn and other social media platforms to promote our services and participate in industry forums as a speaker to drive industry recognition and engagement
  • Deal Closing and Strategic Collaboration: Collaborate with stakeholders, including the CTO, CRO, partners, and clients, to align strategies with market trends and customer needs. Drive the efforts to close deals by capitalizing on the abundant leads and opportunities we receive. Conduct research and gather feedback to define the vision, goals, and roadmap for cybersecurity solutions. Provide strategic guidance for business development, leveraging your expertise in successful deal closures. Foster cross-functional collaboration to bring industry-leading cybersecurity solutions to market, driving adoption, and ensuring successful outcomes
  • Fulltime
Read More
Arrow Right

Senior Security Researcher

The Defender Experts (DEX) Research team is at the forefront of Microsoft’s thre...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 10+ years of experience in security research, detection engineering, threat lifecycle, cloud security in large-scale in complex cloud environments, as well as disciplines related to managed services for EDR and SIEM platforms
  • Proven ability to lead and execute advanced research on emerging cloud-based threats affecting both Microsoft and third-party security products across heterogeneous cloud environments
  • Demonstrated expertise in developing and refining detection and response strategies leveraging major EDR and SIEM platforms, with a strong emphasis on Microsoft Defender and Sentinel, to provide comprehensive threat coverage and response capabilities
  • Extensive hands-on experience with cloud platforms—including, but not limited to, Azure—as well as a deep understanding of multi-cloud security challenges and solutions
  • Strong practical experience identifying, analyzing, and mitigating real-world cyber threats in complex cloud environments
  • Proven ability to work independently and deliver complete solutions
  • Demonstrated capability to effectively articulate technical insights and influence multidisciplinary teams
Job Responsibility
Job Responsibility
  • Lead and execute advanced research on emerging endpoint, identity and cloud-based threats impacting Microsoft and third-party security products across heterogeneous cloud environments
  • Develop and refine detection and response strategies leveraging major EDR and SIEM platforms, with a strong emphasis on Microsoft Defender and Sentinel, to provide comprehensive threat coverage and response capabilities
  • Collaborate with internal and external security teams to design and implement scalable, innovative solutions for multi-cloud threat intelligence, detection, mitigation and response
  • Translate complex raw security data into actionable intelligence that enhances the effectiveness of cloud security operations for a global customer base
  • Mentor, guide, and drive best practices among researchers and detection engineers on advanced threat hunting and incident response across diverse SIEM ecosystems
  • Contribute to industry knowledge and Microsoft’s security posture by publishing research, developing threat models, and proactively identifying threats and attack trends in the cloud
  • Fulltime
Read More
Arrow Right

Red Team Operations Manager

To lead, oversee, and quality assure the execution of Red Team engagements end-t...
Location
Location
United Kingdom
Salary
Salary:
Not provided
bugcrowd.com Logo
Bugcrowd
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Extensive experience leading and/or managing Red Team engagements in enterprise environments, preferably across multiple industries (e.g. finance, critical infrastructure, cloud / SaaS / OT)
  • Deep technical knowledge of exploitation, post-exploitation, lateral movement, persistence, command & control, evasion, privilege escalation
  • Good knowledge and experience with Blue Team controls e.g. IDS/IPS, SIEM, EDR, NGFW, log analysis, detection engineering, ideally experience in bypassing or evading them safely
  • Solid experience with modern cloud environments (Azure, AWS, GCP), hybrid / on-premise networks, potentially OT/IoT/industrial environments
  • Strong tradecraft / OpSec awareness around how to avoid detection and conduct operations with minimal operational risk
  • Familiarity with CREST / STAR / TIBER etc. and regulatory / compliance requirements in relevant geographies
  • Proven experience in threat intelligence ingestion, scenario design, mapping to relevant threat actors
  • Excellent written and verbal communication skills and able to produce high quality reports, executive summaries, interact with senior leadership, legal, compliance etc.
  • Good project / operations management skills with an eye for budgeting, scheduling, resource allocation, interfacing external/internal teams
  • Ability to make real-time decisions under pressure, to balance risk vs reward
Job Responsibility
Job Responsibility
  • Lead, oversee, and quality assure the execution of Red Team engagements end-to-end from scoping & planning, through execution, reporting, to debrief and capability development
  • Ensure that all operations are safe, legal, technically robust, aligned with threat intelligence, compliance frameworks, and deliver high value to customers
  • Act as a subject-matter expert and manager for both operations and sales / client-facing aspects of Red Team services
  • Lead multiple concurrent Red Team engagements across industries
  • Define, negotiate and document scope, objectives, rules of engagement, deliverables, constraints, escalation & approval pathways
  • Oversee milestone planning e.g. kick-offs, stand-ups, wash-ups, strategic debriefs
  • Manage resources e.g. operator assignments, tooling, support functions
  • Track engagement progress vs objectives, adjust as needed
  • Assess and manage technical risk ensuring that any red team activity minimises risk to customer operations, data, systems
  • Real-time decision making during operations around TTP deployment, bypass of defenses, managing detections or unexpected discovery
Read More
Arrow Right

Graph Researcher II

The Defender Experts (DEX) Research team is at the forefront of Microsoft’s thre...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4+ years of experience in security research, detection engineering, threat lifecycle, cloud security in large-scale in complex cloud environments
  • Strong understanding of graph theory, graph databases (e.g., Neo4j, TigerGraph), and graph analytics with proficiency in Python or similar languages for data analysis and prototyping
  • Experience working with large-scale datasets, distributed systems and graph analytics projects
  • Ability to translate complex threat data into graphs and actionable insights
  • Experience with machine learning or statistical modelling applied to graph data
  • Proven ability to lead and execute advanced research on emerging cloud-based threats affecting both Microsoft and third-party security products across heterogeneous cloud environments
  • Knowledge of adversary infrastructure tracking, malware analysis, or campaign clustering
  • Extensive hands-on experience with cloud platforms—including, but not limited to, Azure—as well as a deep understanding of multi-cloud security challenges and solutions
Job Responsibility
Job Responsibility
  • Design and maintain scalable threat graphs that model entities such as devices, identity, threat actors, TTPs, infrastructure, and campaigns
  • Execute advanced research to develop algorithms and heuristics to detect malicious patterns and relationships within graph data on emerging cloud-based threats impacting Microsoft and third-party security products across heterogeneous cloud environments
  • Collaborate with threat protection researchers, data scientists, and detection engineers to enrich graph models with contextual insights and refine detection and response strategies, to provide comprehensive threat coverage and response capabilities
  • Research and prototype novel graph-based techniques for threat detection, attribution, and prioritization in collaboration with internal and external security teams
  • Translate complex raw security data into actionable graph intelligence that enhances the effectiveness of security operations for a global customer base
  • Mentor, guide, and drive best practices among researchers and detection engineers on advanced graph-based threat hunting and incident response across diverse ecosystems
  • Contribute to industry knowledge and Microsoft’s security posture by publishing research, developing threat graph models, and proactively identifying threats and attack trends in the cloud
  • Fulltime
Read More
Arrow Right

Red Team Operations Manager

To lead, oversee, and quality assure the execution of Red Team engagements end-t...
Location
Location
Australia
Salary
Salary:
Not provided
bugcrowd.com Logo
Bugcrowd
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Extensive experience leading and/or managing Red Team engagements in enterprise environments, preferably across multiple industries (e.g. finance, critical infrastructure, cloud / SaaS / OT)
  • Deep technical knowledge of exploitation, post-exploitation, lateral movement, persistence, command & control, evasion, privilege escalation
  • Good knowledge and experience with Blue Team controls e.g. IDS/IPS, SIEM, EDR, NGFW, log analysis, detection engineering, ideally experience in bypassing or evading them safely
  • Solid experience with modern cloud environments (Azure, AWS, GCP), hybrid / on-premise networks, potentially OT/IoT/industrial environments
  • Strong tradecraft / OpSec awareness around how to avoid detection and conduct operations with minimal operational risk
  • Familiarity with CREST / STAR / TIBER etc. and regulatory / compliance requirements in relevant geographies
  • Proven experience in threat intelligence ingestion, scenario design, mapping to relevant threat actors
  • Excellent written and verbal communication skills and able to produce high quality reports, executive summaries, interact with senior leadership, legal, compliance etc.
  • Good project / operations management skills with an eye for budgeting, scheduling, resource allocation, interfacing external/internal teams
  • Ability to make real-time decisions under pressure, to balance risk vs reward
Job Responsibility
Job Responsibility
  • Lead multiple concurrent Red Team engagements across industries
  • Define, negotiate and document scope, objectives, rules of engagement, deliverables, constraints, escalation & approval pathways
  • Oversee milestone planning e.g. kick-offs, stand-ups, wash-ups, strategic debriefs
  • Manage resources e.g. operator assignments, tooling, support functions
  • Track engagement progress vs objectives, adjust as needed
  • Assess and manage technical risk ensuring that any red team activity minimises risk to customer operations, data, systems
  • Real-time decision making during operations around TTP deployment, bypass of defenses, managing detections or unexpected discovery
  • Review and approve attack plans, threat modelling, intelligence
  • Ensure operators employ strong operational security (OpSec), safe tradecraft, evidence collection, clean up post-engagement
  • Maintain up-to-date knowledge of Red Team tools, adversary TTPs, defensive controls, detection systems
Read More
Arrow Right

Senior Security Graph Engineer

The Defender Experts (DEX) Research team is at the forefront of Microsoft’s thre...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 4+ years of experience in security research, detection engineering, threat lifecycle, cloud security in large-scale in complex cloud environments
  • Strong understanding of graph theory, graph databases (e.g., Neo4j, TigerGraph), and graph analytics with proficiency in Python or similar languages for data analysis and prototyping
  • Experience working with large-scale datasets, distributed systems and graph analytics projects
  • Ability to translate complex threat data into graphs and actionable insights
  • Experience with machine learning or statistical modelling applied to graph data
  • Proven ability to lead and execute advanced research on emerging cloud-based threats affecting both Microsoft and third-party security products across heterogeneous cloud environments
  • Knowledge of adversary infrastructure tracking, malware analysis, or campaign clustering
  • Extensive hands-on experience with cloud platforms—including, but not limited to, Azure—as well as a deep understanding of multi-cloud security challenges and solutions
  • B. Tech or Equivalent
Job Responsibility
Job Responsibility
  • Design and maintain scalable threat graphs that model entities such as devices, identity, threat actors, TTPs, infrastructure, and campaigns
  • Lead and execute advanced research to develop algorithms and heuristics to detect malicious patterns and relationships within graph data on emerging cloud-based threats impacting Microsoft and third-party security products across heterogeneous cloud environments
  • Collaborate with threat protection researchers, data scientists, and detection engineers to enrich graph models with contextual insights and refine detection and response strategies, to provide comprehensive threat coverage and response capabilities
  • Research and prototype novel graph-based techniques for threat detection, attribution, and prioritization in collaboration with internal and external security teams
  • Translate complex raw security data into actionable graph intelligence that enhances the effectiveness of security operations for a global customer base
  • Mentor, guide, and drive best practices among researchers and detection engineers on advanced graph-based threat hunting and incident response across diverse ecosystems
  • Contribute to industry knowledge and Microsoft’s security posture by publishing research, developing threat graph models, and proactively identifying threats and attack trends in the cloud
  • Fulltime
Read More
Arrow Right

Graph Researcher II

The Defender Experts (DEX) Research team is at the forefront of Microsoft’s thre...
Location
Location
India , Hyderabad
Salary
Salary:
Not provided
https://www.microsoft.com/ Logo
Microsoft Corporation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Strong understanding of graph theory, graph databases (e.g., Neo4j, TigerGraph), and graph analytics with proficiency in Python or similar languages for data analysis and prototyping
  • Experience working with large-scale datasets, distributed systems and graph analytics projects
  • Ability to translate complex threat data into graphs and actionable insights
  • Experience with machine learning or statistical modelling applied to graph data
  • Proven ability to execute advanced research on emerging cloud-based threats affecting both Microsoft and third-party security products across heterogeneous cloud environments
  • Knowledge of adversary infrastructure tracking, malware analysis, or campaign clustering
  • Extensive hands-on experience with cloud platforms—including, but not limited to, Azure—as well as a deep understanding of multi-cloud security challenges and solutions
Job Responsibility
Job Responsibility
  • Design and maintain scalable threat graphs that model entities such as devices, identity, threat actors, TTPs, infrastructure, and campaigns
  • Execute advanced research to develop algorithms and heuristics to detect malicious patterns and relationships within graph data on emerging cloud-based threats impacting Microsoft and third-party security products across heterogeneous cloud environments
  • Collaborate with threat protection researchers, data scientists, and detection engineers to enrich graph models with contextual insights and refine detection and response strategies, to provide comprehensive threat coverage and response capabilities
  • Research and prototype novel graph-based techniques for threat detection, attribution, and prioritization in collaboration with internal and external security teams
  • Translate complex raw security data into actionable graph intelligence that enhances the effectiveness of security operations for a global customer base
  • Mentor, guide, and drive best practices among researchers and detection engineers on advanced graph-based threat hunting and incident response across diverse ecosystems
  • Contribute to industry knowledge and Microsoft’s security posture by publishing research, developing threat graph models, and proactively identifying threats and attack trends in the cloud
  • Fulltime
Read More
Arrow Right

Threat & Identity Analyst

A leading global bank is seeking an Identity Threat Intelligence Analyst to supp...
Location
Location
Malaysia
Salary
Salary:
Not provided
nicollcurtin.com Logo
Nicoll Curtin
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • 5+ years of experience in threat intelligence, cybersecurity analysis, or cyber defense
  • Strong understanding of identity and access management (IAM) technologies including Active Directory, Entra ID, privileged access, and non-human identities
  • Familiarity with cloud and hybrid environments including Azure, AWS, and enterprise infrastructure platforms
  • Knowledge of identity-based attack techniques and frameworks such as MITRE ATT&CK
  • Experience translating threat intelligence into detection use cases or security controls
  • Familiarity with security monitoring, detection engineering, or security operations
  • Strong analytical, research, documentation, and stakeholder communication skills
  • Bachelor’s or Master’s degree in Cybersecurity, Computer Science, or a related field
  • 7–9 years of overall cybersecurity experience preferred, with exposure to identity threat intelligence or ITDR programs
Job Responsibility
Job Responsibility
  • Analyse identity-focused threat intelligence and attacker techniques relevant to enterprise environments
  • Assess identity threat detection coverage across existing security platforms (e.g., identity monitoring and cloud security tools)
  • Map identity threat scenarios across Active Directory, Entra ID, cloud platforms (Azure/AWS), UNIX, and hybrid infrastructure
  • Support proof-of-value (PoV) activities by validating threat scenarios against available detections and telemetry
  • Align identity threat scenarios with MITRE ATT&CK tactics and techniques
  • Translate threat intelligence into prioritized ITDR detection use cases and scenarios
  • Collaborate with ITDR engineers, IAM teams, and security operations to refine detection logic and response strategies
  • Support development and rollout of ITDR pilot capabilities for prioritized identity threats
  • Maintain documentation of identity threat scenarios, adversary techniques, and detection use cases
  • Produce threat intelligence reports, PoV findings, and program artefacts for governance and planning
  • Fulltime
Read More
Arrow Right