Added
less than a minute ago
Type
Full time
Salary
Upgrade to Premium to se...
Related skills
aws python siem threat hunting sigmaπ Description
- Research and report threat actors targeting AI labs and cloud infra
- Build tooling and pipelines to convert indicators into detections
- Execute intelligence-driven threat hunts across endpoints, cloud, identity, and SaaS
- Analyze malware, phishing infra, and attacker tooling to extract indicators
- Translate intel into detection rules and hunting hypotheses with IR context
- Curate inbound intel from feeds, OSS, government, and peers; prioritize
- Contribute to threat models and risk assessments for security architecture
- Build external intel-sharing relationships with peers, ISACs, and government partners
π― Requirements
- 5+ years in cyber threat intelligence, threat hunting, or intrusion analysis
- Deep knowledge of nation-state or advanced criminal threat actors
- Strong engineer who writes production-quality Python and builds automation pipelines
- Experience malware/infrastructure/log analysis to validate findings
- Experience authoring detection logic (YARA, Sigma, Snort/Suricata, or SIEM queries)
- Clear, concise written intelligence products that drive action
- Existing network in the threat intel community with sharing track record
π Benefits
- Competitive compensation and benefits
- Optional equity donation matching
- Generous vacation and parental leave
- Flexible working hours
- Collaborative office space for teams
π Visa sponsorship
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!