MENU
  • Remote Jobs
  • Companies
  • Go Premium
  • Job Alerts
  • Post a Job
  • Log in
  • Sign up
Working Nomads logo Working Nomads
  • Remote Jobs
  • Companies
  • Post Jobs
  • Go Premium
  • Get Free Job Alerts
  • Log in

Security Threat Intelligence Engineer

Cloud Security Services

Freelance / Contract
USA
security
engineer
sap
big data
sql
The job listing has expired. Unfortunately, the hiring company is no longer accepting new applications.

To see similar active jobs please follow this link: Remote Development jobs

About the opportunity:
Cloud Security Services is seeking a Security Threat Intelligence Engineer Consultant to support their Threat Management Threat Intelligence team objectives to ensure cyber threats are continuously evaluated for risk and impact to client, customers, third parties, infrastructure, and wider ecosystem for all environments. This is a 6-month remote opportunity.
Responsibilities:

  • Collecting, processing, and analyzing information regarding security threatsprovides indication and warnings of impending attacks.
  • Producing and disseminatingintelligence products,advisories or tailored reports.
  • Analyze and report on unique attack vectors, emerging cyber threats, and current trends used by malicious actors.
  • Daily threat intelligence monitoring through open and closed sources.
  • Continually improve how the threat intelligence team works, including creation of run books, procedures, automation or other efficiencies.
  • Maintain, develop and continually analyze threat data/intelligence sources, both technical and non-technical.
  • Identify, evaluate and communicate new and ongoing cyber security threats through regular and ad-hoc reporting; produce intelligence briefings, attribution reports, and position papers.
  • Produce concise tactical warning bulletins and other analytic reports that detail daily findings, events, and activities.
  • Conduct collection and support attribution and analysis from incident response and threat hunting functions case findings.
  • Collection and analysis ofAll-Sourceintelligence, research data from multiple intelligence providers in order to analyze findingsand produce quality Intelligence Products.
  • Support threat hunts and purple teaming endeavors to identify threat actor groups and their techniques, tools, and processes utilizing threat intelligence.
  • Analysis of anomalous log data, and results of collaborative team sessions to detect, and eradicate threat actors on the network.
  • Analyze and support security incidents for further enrichment of detection and alerting capabilities.
  • Continuously improve processes for use across detection sets for more efficient operations.
  • Generatereporting of trending metrics.
  • Acquire threat intelligence and technical indicators from external sources; develop tactical intelligence and technical indicators internallyand collaborate with the incident response often.
  • Evaluate data sources for consideration in the improvement and expansion of the threat intelligence program.

Required Skills

  • Solid understanding of common and advanced threats, penetration/intrusion techniquesand attack vectors such as
  • Malware analysis
  • APT/Crimeware ecosystems
  • Exploit kits
  • Cyber Hunting
  • Cyber Threat intelligence
  • Software vulnerabilities & exploitation
  • Data analysis
  • Knowledge of current hacking techniques, cyber threat actors, attribution concepts, security analysis techniques, recent cyber incidentsand vulnerability disclosures.
  • Understanding of common threat analysis, and threat modeling techniques used in CTI such as diamond model, kill chain, F3EAD,MITRE ATT&CK framework,and the threat intelligence lifecycle.
  • Competency in using common intelligence datasets obtained from information sharing sources, malware collections,and other internet derived data.
  • Familiarity with the following tools:
  • Threat Intelligence Platform (TIP)
  • Threat intelligence feeds
  • STIX, MISP and TAXII frameworks
  • Open Source Intelligence feeds and tools (OSINT)
  • Malware Analysis / Reversal Tools
  • Security Incident and Event Monitoring (SIEM)
  • Security Orchestration, Automation & Response (SOAR)
  • Network sniffers and packet tracing tools.
  • Threat Intelligence Platforms (TIP)
  • Security Information& Event Management (SIEM)
  • Intrusion Detection& Prevention (IDS/IPS)
  • End Point Detect& Response (EDR)
  • Email and Web filtering technologies
  • link-analysis methods and software (e.g., Maltego, Analyst Notebook)
  • Familiarity with:
  • Cloud platforms - AWS, Azure, Google Cloud Platform etc.
  • Meraki dashboard and products
  • Ability to write custom query logic for major Security Incident and Event Monitoring (SIEM) tools.
  • Ability to write SQL to search data warehouse databases.
  • A minimum of 10 years of information security experience with at least 7 years of experience with all-source cyber intelligence and analysis;or the equivalent combination of higher education and/or real-world experience.
  • Have experience working on threat intelligence teams with specific experience in cyber threat intelligence, cybersecurity operations, security monitoring, malware analysis, threat hunting, and/or adversary emulation.
  • Strong analytical reasoning skills with the ability to recognize and evaluate facts, objectively analyze events, blend and organize threat data from multiple sources.
  • Experience conducting intelligence research using existing tools, analyze data, making connections for purposes of creating intelligence products.
  • Possess organizational multitasking and commitment to follow-up.
  • Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing cyber threats.
  • Ability to communicate intelligence and analysis of cyber threats in various forms (written production; briefings)to varying audiences.
  • Understand common threat actor tactics, techniques, and procedures (TTPs) and how they are chained together.
  • Experience in working with a geographically diverse team in multiple time zones around the globe.
  • Broad experience managing complex projects, particularly projects requiring support and partnership outside your immediate team.
  • Ability to create and/or re-architect new and existing solutions in a scalable manner.
  • Are able to workindependently and identify areas of need in highly ambiguous and time-sensitive situations.
  • Demonstrated familiarity and expertise with data analytics tools like Splunk, ELK, Snowflake or other searchable big data solutions.
  • Excellent analytical skills.
  • Collaborative team worker both in person and virtually using WebEx or similar.
  • Excellent documentation skills; demonstrated proficiency in Microsoft Office including Word, Excel and PowerPoint.
  • Ability to work as liaison between business and information security / information technology.
  • Flexibility to accommodate working across different time zones.
  • Ability to work PST (Pacific Time Zone).
  • Excellent interpersonal communication skills with strong spoken and written English.
  • Business outcomes mindset.
  • Solid balance of strategic thinking with detailed orientation.
  • Self-starter, ability to take initiative.
  • Project management and organizational skills with attention to detail.

Preferred Skills

  • Relevant industry security certifications such as CISSP, SANS GIAC (e.g.GCTI, GCIH, GNFA, GCFE, GCFA, GREM), AWS certifications (SAA, SAP, or SCS), etc.
  • Experience developing and presenting cybersecurity topics in written products and presentations, including conference presentations, webinars, and blog posts.
  • Familiarity with other security verticals such as: Digital Forensics,Incident Response, Threat Detection, Application Security, Cloud Security, Offensive Security.
  • Networking experience with LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP, and NSRP) routing protocols and technologies.
  • Considerable working knowledge in one or more of the following topics APT, Cybercriminals, financially motivated cyber groups, Hacktivism, DDoS attack methods, malware variants, Mobile and Emerging Threats, Social Engineering, Insider Threats.
  • Broad network and technology awareness, with the ability to convey complex or technical topics in a clear and concise manner.

Required Education

  • Bachelor's degree (BA/BS) in Computer Science from four-year college or university; or equivalent training, education, and work experience. Cybersecurity certifications such as CISSP, CISM, etc.

Preferred Education

  • Cybersecurity certifications such as CISSP, CISM, etc.

About the job

Freelance / Contract
USA
Posted 11 months ago
security
engineer
sap
big data
sql
Enhancv advertisement

30,000+
REMOTE JOBS

Unlock access to our database and
kickstart your remote career
Join Premium

Security Threat Intelligence Engineer

Cloud Security Services
The job listing has expired. Unfortunately, the hiring company is no longer accepting new applications.

To see similar active jobs please follow this link: Remote Development jobs

About the opportunity:
Cloud Security Services is seeking a Security Threat Intelligence Engineer Consultant to support their Threat Management Threat Intelligence team objectives to ensure cyber threats are continuously evaluated for risk and impact to client, customers, third parties, infrastructure, and wider ecosystem for all environments. This is a 6-month remote opportunity.
Responsibilities:

  • Collecting, processing, and analyzing information regarding security threatsprovides indication and warnings of impending attacks.
  • Producing and disseminatingintelligence products,advisories or tailored reports.
  • Analyze and report on unique attack vectors, emerging cyber threats, and current trends used by malicious actors.
  • Daily threat intelligence monitoring through open and closed sources.
  • Continually improve how the threat intelligence team works, including creation of run books, procedures, automation or other efficiencies.
  • Maintain, develop and continually analyze threat data/intelligence sources, both technical and non-technical.
  • Identify, evaluate and communicate new and ongoing cyber security threats through regular and ad-hoc reporting; produce intelligence briefings, attribution reports, and position papers.
  • Produce concise tactical warning bulletins and other analytic reports that detail daily findings, events, and activities.
  • Conduct collection and support attribution and analysis from incident response and threat hunting functions case findings.
  • Collection and analysis ofAll-Sourceintelligence, research data from multiple intelligence providers in order to analyze findingsand produce quality Intelligence Products.
  • Support threat hunts and purple teaming endeavors to identify threat actor groups and their techniques, tools, and processes utilizing threat intelligence.
  • Analysis of anomalous log data, and results of collaborative team sessions to detect, and eradicate threat actors on the network.
  • Analyze and support security incidents for further enrichment of detection and alerting capabilities.
  • Continuously improve processes for use across detection sets for more efficient operations.
  • Generatereporting of trending metrics.
  • Acquire threat intelligence and technical indicators from external sources; develop tactical intelligence and technical indicators internallyand collaborate with the incident response often.
  • Evaluate data sources for consideration in the improvement and expansion of the threat intelligence program.

Required Skills

  • Solid understanding of common and advanced threats, penetration/intrusion techniquesand attack vectors such as
  • Malware analysis
  • APT/Crimeware ecosystems
  • Exploit kits
  • Cyber Hunting
  • Cyber Threat intelligence
  • Software vulnerabilities & exploitation
  • Data analysis
  • Knowledge of current hacking techniques, cyber threat actors, attribution concepts, security analysis techniques, recent cyber incidentsand vulnerability disclosures.
  • Understanding of common threat analysis, and threat modeling techniques used in CTI such as diamond model, kill chain, F3EAD,MITRE ATT&CK framework,and the threat intelligence lifecycle.
  • Competency in using common intelligence datasets obtained from information sharing sources, malware collections,and other internet derived data.
  • Familiarity with the following tools:
  • Threat Intelligence Platform (TIP)
  • Threat intelligence feeds
  • STIX, MISP and TAXII frameworks
  • Open Source Intelligence feeds and tools (OSINT)
  • Malware Analysis / Reversal Tools
  • Security Incident and Event Monitoring (SIEM)
  • Security Orchestration, Automation & Response (SOAR)
  • Network sniffers and packet tracing tools.
  • Threat Intelligence Platforms (TIP)
  • Security Information& Event Management (SIEM)
  • Intrusion Detection& Prevention (IDS/IPS)
  • End Point Detect& Response (EDR)
  • Email and Web filtering technologies
  • link-analysis methods and software (e.g., Maltego, Analyst Notebook)
  • Familiarity with:
  • Cloud platforms - AWS, Azure, Google Cloud Platform etc.
  • Meraki dashboard and products
  • Ability to write custom query logic for major Security Incident and Event Monitoring (SIEM) tools.
  • Ability to write SQL to search data warehouse databases.
  • A minimum of 10 years of information security experience with at least 7 years of experience with all-source cyber intelligence and analysis;or the equivalent combination of higher education and/or real-world experience.
  • Have experience working on threat intelligence teams with specific experience in cyber threat intelligence, cybersecurity operations, security monitoring, malware analysis, threat hunting, and/or adversary emulation.
  • Strong analytical reasoning skills with the ability to recognize and evaluate facts, objectively analyze events, blend and organize threat data from multiple sources.
  • Experience conducting intelligence research using existing tools, analyze data, making connections for purposes of creating intelligence products.
  • Possess organizational multitasking and commitment to follow-up.
  • Ability to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing cyber threats.
  • Ability to communicate intelligence and analysis of cyber threats in various forms (written production; briefings)to varying audiences.
  • Understand common threat actor tactics, techniques, and procedures (TTPs) and how they are chained together.
  • Experience in working with a geographically diverse team in multiple time zones around the globe.
  • Broad experience managing complex projects, particularly projects requiring support and partnership outside your immediate team.
  • Ability to create and/or re-architect new and existing solutions in a scalable manner.
  • Are able to workindependently and identify areas of need in highly ambiguous and time-sensitive situations.
  • Demonstrated familiarity and expertise with data analytics tools like Splunk, ELK, Snowflake or other searchable big data solutions.
  • Excellent analytical skills.
  • Collaborative team worker both in person and virtually using WebEx or similar.
  • Excellent documentation skills; demonstrated proficiency in Microsoft Office including Word, Excel and PowerPoint.
  • Ability to work as liaison between business and information security / information technology.
  • Flexibility to accommodate working across different time zones.
  • Ability to work PST (Pacific Time Zone).
  • Excellent interpersonal communication skills with strong spoken and written English.
  • Business outcomes mindset.
  • Solid balance of strategic thinking with detailed orientation.
  • Self-starter, ability to take initiative.
  • Project management and organizational skills with attention to detail.

Preferred Skills

  • Relevant industry security certifications such as CISSP, SANS GIAC (e.g.GCTI, GCIH, GNFA, GCFE, GCFA, GREM), AWS certifications (SAA, SAP, or SCS), etc.
  • Experience developing and presenting cybersecurity topics in written products and presentations, including conference presentations, webinars, and blog posts.
  • Familiarity with other security verticals such as: Digital Forensics,Incident Response, Threat Detection, Application Security, Cloud Security, Offensive Security.
  • Networking experience with LAN/WAN routing and high availability (OSPF, BGP4/iBGP, EIGRP, and NSRP) routing protocols and technologies.
  • Considerable working knowledge in one or more of the following topics APT, Cybercriminals, financially motivated cyber groups, Hacktivism, DDoS attack methods, malware variants, Mobile and Emerging Threats, Social Engineering, Insider Threats.
  • Broad network and technology awareness, with the ability to convey complex or technical topics in a clear and concise manner.

Required Education

  • Bachelor's degree (BA/BS) in Computer Science from four-year college or university; or equivalent training, education, and work experience. Cybersecurity certifications such as CISSP, CISM, etc.

Preferred Education

  • Cybersecurity certifications such as CISSP, CISM, etc.

Working Nomads

Post Jobs
Premium Subscription
Sponsorship
Free Job Alerts

Job Skills
API
FAQ
Privacy policy
Terms and conditions
Contact us
About us

Jobs by Category

Remote Administration jobs
Remote Consulting jobs
Remote Customer Success jobs
Remote Development jobs
Remote Design jobs
Remote Education jobs
Remote Finance jobs
Remote Legal jobs
Remote Healthcare jobs
Remote Human Resources jobs
Remote Management jobs
Remote Marketing jobs
Remote Sales jobs
Remote System Administration jobs
Remote Writing jobs

Jobs by Position Type

Remote Full-time jobs
Remote Part-time jobs
Remote Contract jobs

Jobs by Region

Remote jobs Anywhere
Remote jobs North America
Remote jobs Latin America
Remote jobs Europe
Remote jobs Middle East
Remote jobs Africa
Remote jobs APAC

Jobs by Skill

Remote Accounting jobs
Remote Assistant jobs
Remote Copywriting jobs
Remote Cyber Security jobs
Remote Data Analyst jobs
Remote Data Entry jobs
Remote English jobs
Remote Spanish jobs
Remote Project Management jobs
Remote QA jobs
Remote SEO jobs

Jobs by Country

Remote jobs Australia
Remote jobs Argentina
Remote jobs Brazil
Remote jobs Canada
Remote jobs Colombia
Remote jobs France
Remote jobs Germany
Remote jobs Ireland
Remote jobs India
Remote jobs Japan
Remote jobs Mexico
Remote jobs Netherlands
Remote jobs New Zealand
Remote jobs Philippines
Remote jobs Poland
Remote jobs Portugal
Remote jobs Singapore
Remote jobs Spain
Remote jobs UK
Remote jobs USA


Working Nomads curates remote digital jobs from around the web.

© 2025 Working Nomads.