Source Job

Australia New Zealand

  • Analyse incoming threat signals to produce actionable intelligence products.
  • Maintain intelligence infrastructure and automation workflows.
  • Conduct independent research on emerging threats and maintain a library of adversaries.

Threat Intelligence Incident Response Threat Hunting Security Operations Automation

19 jobs similar to Senior Security Engineer - Threat Intelligence

Jobs ranked by similarity.

$156,000–$210,000/yr

  • Research, track, and assess the threat landscape by analyzing relevant threat actors and campaigns.
  • Analyze and prioritize information to develop actionable intelligence for detection coverage and response readiness.
  • Partner with Detection Engineering to design and validate threat-based detections through adversary emulation and simulation.

1Password is building the foundation for a safe, productive digital future. They provide password management and access management solutions for businesses. They have surpassed $400M in ARR and have over 180,000 businesses as clients and have a culture that prioritizes collaboration and clear communication.

US

  • Conduct original, in-depth threat research on advanced adversaries, emerging malware, attack techniques, and evolving TTPs.
  • Design, develop, and maintain high-fidelity detections aligned to adversary behaviors and techniques.
  • Serve as a customer-facing technical expert, providing intelligence products, detection engineering and otherwise augmenting their capabilities.

Anomali is the Leading AI-Powered Security Operations Platform that is modernizing security operations. Anomali unifies ETL, SIEM, XDR, SOAR, and the world's largest repository of global intelligence into a single, cloud-native platform that improves detection, speeds investigations, and reduces costs at scale.

Europe

  • Analyze cyber threats and produce actionable intelligence.
  • Support the development of detection capabilities.
  • Deliver technical briefings and executive-level summaries.

Jobgether uses an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements.

$156,000–$210,000/yr
US Canada

  • Design, build, and continuously improve threat detections across 1Password’s infrastructure, products, internal tools, and corporate environments.
  • Lead and support security incident response activities, including investigation, containment, remediation, and post-incident learning.
  • Collaborate with Security, Infrastructure, and IT teams to improve security visibility, logging quality, and response readiness.

1Password is building the foundation for a safe, productive digital future. They innovated the market-leading enterprise password manager and pioneered Extended Access Management, a new cybersecurity category built for the way people and AI agents work today. Over 180,000 businesses trust 1Password to help their teams securely adopt the SaaS and AI tools they need to do their best work.

US

Investigate and analyze sophisticated cyber threats targeting cloud environments. Identify and track state-backed and financially motivated threat actors. Communicate findings to internal teams, customers, and the public, ensuring clarity and actionable insights.

This position is posted by Jobgether on behalf of a partner company and uses an AI-powered matching process to ensure quick and fair application reviews.

Europe

  • Provide timely and actionable intelligence to support customer intelligence requirements
  • Collaborate with a global team of threat intelligence analysts to analyze and develop coverage for emerging threats
  • Develop tactical hunting and strategic threat assessments in support of customer needs

Palo Alto Networks' mission is to be the cybersecurity partner of choice, protecting our digital way of life with a vision for a safer, more secure world. They challenge and disrupt the status quo, seeking innovators committed to shaping the future of cybersecurity.

Europe

  • Lead the design, develop, and implementation of incident response playbooks.
  • Be part of a weekly on-call rotation and support in detection engineering.
  • Identify areas for security improvement and translate that into workable solutions.

Ping Identity's cloud identity platform enables secure and seamless digital experiences. They are headquartered in Denver, Colorado, with offices and employees around the globe, serving large enterprises.

$101,500–$120,000/yr
US

  • Identifying, scoping, and managing ongoing customer incidents, developing remediation plans, and augmenting the customer’s security gaps with the necessary skills and resources to improve their security maturity
  • Tailoring communication to the customer’s level of expertise, providing education and information to help them understand the bigger picture and make educated decisions
  • Partnering with the Detection Engineering, Intelligence, and Research teams to further investigate identified or emerging threats relevant to our customers

Zscaler accelerates digital transformation so our customers can be more agile, efficient, resilient, and secure. Our cloud native Zero Trust Exchange platform protects thousands of customers from cyberattacks and data loss by securely connecting users, devices, and applications in any location.

Global Unlimited PTO

  • Identify and monitor external threat groups targeting Sardine and our merchants for ATO or Payment Fraud.
  • Investigate tools used by Fraudsters and cyber criminals for bot and payment fraud from the Dark Web and OSINT communities.
  • Own and manage the entire threat intelligence lifecycle, including planning, collection, processing, analysis, production, and dissemination of intelligence on cybercrime and financial fraud threats.

Sardine is a leader in fraud prevention and AML compliance. Their platform uses device intelligence, behavior biometrics, machine learning, and AI to stop fraud before it happens. They have hubs in the Bay Area, NYC, Austin, and Toronto and maintain a remote-first work culture, valuing performance and self-motivated individuals.

Australia

  • Assist in designing and maintaining secure infrastructure in cloud and on-premises environments.
  • Lead incident response activities, managing the lifecycle from detection to recovery.
  • Support detection engineering and refine detection rules for cloud, endpoint, and network environments.

Jobgether is a platform that connects job seekers with potential employers. They use AI-powered matching to ensure applications are reviewed quickly and fairly, then share the shortlist with the hiring company.

US

  • Monitor and analyze security alerts to identify potential threats.
  • Conduct proactive threat hunting across different environments.
  • Investigate security incidents and determine root cause.

Globe Life is committed to empowering employees with support and opportunities to succeed in their careers. They foster a caring and innovative culture that enables them to grow and overcome challenges in a connected and collaborative environment.

$175,000–$200,000/yr
US Unlimited PTO

  • Monitor and analyze security events to detect potential threats.
  • Reverse engineer Windows PE files and other malicious binaries.
  • Collaborate with various teams to improve product resilience.

Halcyon was formed in 2021 by a team of cyber industry veterans after battling the scourge of ransomware for years at some of the largest global security vendors.

$100,000–$130,000/yr
US

  • Monitor and triage security alerts, ensuring timely and accurate threat identification.
  • Act as a primary responder for security incidents, managing the full incident response lifecycle.
  • Develop and refine threat detection capabilities by incorporating threat intelligence.

Jobgether uses an AI-powered matching process to ensure your application is reviewed quickly, objectively, and fairly against the role's core requirements.

US

  • Lead incident response efforts for high-severity and complex security events.
  • Perform advanced threat analysis, including APT detection and analysis of threat actor tactics.
  • Lead continuous improvement initiatives for SOC processes, workflow automation, and detection coverage.

Brightspeed is providing fast, reliable internet connections and customer experience in twenty states throughout the Midwest and South. They are backed by funds managed by Apollo Global Management and are upgrading copper to fiber optic technologies.

US

  • Monitor, investigate, triage, and respond to security alerts.
  • Perform advanced network analysis and conduct log analysis.
  • Assist with EDR investigations and support the Incident Response Team.

Industrial Electric Mfg. (IEM) is the largest independent full-line manufacturer of custom power distribution systems in North America. With $1B+ in annual sales and 10,000+ commissioned projects across technology, data centers, commercial, energy, utilities, healthcare, industrial, and infrastructure markets, IEM continues to deliver exceptional product quality, dependable service, and the flexibility to meet complex technical requirements at scale.

$64,938–$103,901/yr
US

  • Monitor alerts from security tools and work towards resolution.
  • Participate in incident response and perform incident reporting.
  • Collaborate with team members to develop SOC IR strategies.

CSG empowers companies to build unforgettable experiences, making it easier for people and businesses to connect with, use and pay for the services they value most. CSG's technologies and people have helped some of the world's most recognizable brands solve their toughest business challenges and evolve to meet the demands of today's digital economy.

$119,000–$127,000/yr
US

  • Using Red Canary’s detection platform to analyze EDR telemetry, alerts, and log sources.
  • Researching coverage opportunities then creating new detectors, and tune existing ones.
  • Improving the Detection Engineering workflow through orchestration & automation.

Zscaler accelerates digital transformation, protecting customers from cyberattacks and data loss. They value transparency and constructive debate, building high-performing teams focused on customer obsession, collaboration, ownership, and accountability.

$20–$22/hr
Global

  • Monitor security alerts and events using SIEM and other monitoring tools.
  • Analyze and respond to security incidents, including malware infections, phishing attempts, and unauthorized access.
  • Triage and prioritize alerts based on severity and potential impact.

ATPCO is the world's primary source for air fare content, holding over 200 million fares across 160 countries. ATPCO believes in flexibility, trust, and a culture where your wellbeing comes first, offering open-door leadership and real-time recognition.

Canada 4w PTO

As a Senior Incident Response Developer, you will investigate complex security incidents and build scalable response processes. You'll help enhance security incident response capabilities through relationships with Engineering teams. You will be involved in shaping the Security Incident Response team and acting as Incident Commander to resolve incidents.

Wealthsimple is on a mission to help everyone achieve financial freedom by reimagining what it means to manage your money.