Job Description

Role Overview:

A Threat Intelligence Engineer is responsible for collecting, analyzing, and operationalizing threat intelligence to protect an organization’s digital assets. They work closely with SOC teams, incident responders, and security engineers to detect, analyze, and mitigate emerging threats.

Key Responsibilities:

  • Collect, analyze, and process threat intelligence data from various sources, including open-source intelligence , commercial feeds, and dark web monitoring.
  • Monitor brand protection platforms to detect impersonation, phishing, and fraud targeting the organization.
  • Manage threat intelligence platforms (TIP) to enhance threat data aggregation and automation.
  • Track and analyze threat actor tactics, techniques, and procedures (TTPs) using MITRE ATT&CK and other frameworks.
  • Perform proactive threat hunting across EDR solutions and SIEM platforms.
  • Investigate threats detected on the dark web, including credential leaks, fraud schemes, and data breaches.
  • Collaborate with SOC, and incident response teams to provide actionable intelligence.
  • Develop intelligence-driven detection rules to improve security monitoring and reduce response times.
  • Generate intelligence reports and brief stakeholders on evolving threats and mitigation strategies.
  • Continuously evaluate and improve threat intelligence processes and tools.

Skills and Qualifications:

  • Experience with threat intelligence platforms (TIPs) such as MISP.
  • Hands-on experience with brand protection solutions (e.g., ZeroFox, Digital Shadows, Bolster).
  • Strong knowledge of EDR solutions (e.g., Crowd Strike, Sentinel One, Microsoft Defender ATP).
  • Familiarity with dark web monitoring tools and techniques for tracking cybercriminal activities.
  • Understanding of threat actor methodologies, attack campaigns, and malware analysis.
  • Experience with SIEM solutions (QRadar) and log analysis for threat detection.
  • Knowledge of threat hunting techniques using indicators of compromise (IOCs) and behavior-based analytics.
  • Strong analytical and problem-solving skills.
  • 1-2 years of experience in cybersecurity, with a focus on threat intelligence.

Certifications (Nice to Have):

  • MITRE ATT&CK Cyber Threat Intelligence Certification, CompTIA CySA+, CEH, or equivalent.