Related skills
mitre att&ckπ Description
- Analyze large-scale security data to identify attacker behavior, TTPs, and risks.
- Map behaviors to MITRE ATT&CK and real-world tradecraft.
- Model attack paths with the Illumio security graph to reduce lateral movement.
- Identify gaps in detection, data enrichment, and segmentation.
- Develop and validate hypotheses about evolving threats with research sources.
- Translate research findings into product improvements and risk insights.
π― Requirements
- 5+ years in threat research, IR, detection engineering, or adversary emulation.
- Strong attacker tradecraft knowledge across enterprise, cloud, and hybrid.
- Deep MITRE ATT&CK knowledge and real-world TTP mapping.
- Hands-on with security telemetry sources.
- Excellent written and verbal communication; translate complex findings.
- Comfort with ambiguity and defining new functions.
- Experience writing detection rules, analytics queries, or threat hunting.
π Benefits
- Previous experience at a cybersecurity product company.
- Track record of publishing threat research or speaking at industry conferences.
- Experience integrating external threat intelligence feeds.
- Relevant certifications (e.g., GCIH, GCFA, or similar).
Meet JobCopilot: Your Personal AI Job Hunter
Automatically Apply to Engineering Jobs. Just set your
preferences and Job Copilot will do the rest β finding, filtering, and applying while you focus on what matters.
Help us maintain the quality of jobs posted on Empllo!
Is this position not a remote job?
Let us know!