
Manager, Cyber Threat Intelligence
Posted 4 hours ago

Posted 4 hours ago
• Oversee a team of engineers and analysts tasked with cyber threat intelligence, adversary tracking, and vulnerability research to support Anduril's products, infrastructure, and personnel.
• Develop the strategy and roadmap for TAR, balancing ongoing adversary tracking initiatives, opportunistic vulnerability research, and responsive support to partner teams.
• Act as DNR's primary contact for intelligence requirements from the detection and response, offensive security, and product security teams, translating their needs into prioritized deliverables for the team.
• Collaborate with the detection and response team to ensure that intelligence is integrated into detections, hunts, and response playbooks.
• Work cross-functionally with offensive security and product security on red team engagements, product threat modeling, and vulnerability disclosure issues.
• Deliver regular briefings to senior leadership, program stakeholders, and government partners regarding the threat landscape, adversary activities targeting Anduril, and the team's assessments.
• Build and sustain the team's analytic tradecraft, intelligence production standards, and tools, including threat actor tracking systems, signature development (YARA, Snort, and similar), and intelligence data integration pipelines.
• Lead intricate investigations into targeted threat activities, supply chain compromises, and infrastructure-based campaigns impacting Anduril.
• Foster relationships with external partners across the intelligence community, industry ISACs, and peer defense-industrial-base companies to facilitate joint capabilities and information sharing.
• Recruit, develop, and retain a high-performing team of intelligence analysts and research engineers.
• A minimum of 5 years of experience in cyber threat intelligence, threat research, vulnerability research, or related areas.
• At least 3 years of experience in leading teams and managing complex security programs.
• Demonstrated experience in analyzing sophisticated threat actor campaigns, including nation-state, supply chain, and infrastructure-based activities, and in developing effective countermeasures.
• Strong understanding of cybersecurity principles across endpoint, application, network, and cloud environments.
• Proficiency in one or more programming languages (Python, Go, Rust, etc.).
• Excellent written and verbal communication skills, with the ability to present information to both technical and executive audiences.
• Must be eligible to obtain and maintain an active U.S. Secret security clearance.
• Health insurance
• 401(k) matching
• Flexible work hours
• Paid time off
• Remote work options
CVS Health
Docker, Inc
Inway Systems GmbH
Doosan
Get handpicked remote jobs straight to your inbox weekly.