Staff Security Engineer for Threat Intel
Company | CoreWeave |
---|---|
Location | Livingston, NJ, USA, New York, NY, USA, Bellevue, WA, USA, Sunnyvale, CA, USA |
Salary | $230000 – $275000 |
Type | Full-Time |
Degrees | |
Experience Level | Expert or higher |
Requirements
- 15+ years of experience in cyber threat intelligence, threat hunting, or security operations, with a focus on cloud environments.
- Deep understanding of threat actor tactics, attack frameworks (MITRE ATT&CK), and malware analysis methodologies.
- Experience with cyber threat intelligence platforms (TIPs), SIEM, SOAR, and EDR solutions.
- Proficiency in scripting languages (Python, Bash, etc.) for automating threat intelligence workflows.
- Strong knowledge of cloud security best practices, particularly in containerized and GPU-accelerated cloud environments.
- Familiarity with dark web monitoring, intelligence collection techniques, and adversary tracking.
- Excellent written and verbal communication skills for conveying intelligence insights to technical and non-technical audiences.
- Experience in securing AI/ML workloads, high-performance computing (HPC), or GPU-accelerated environments.
- Hands-on experience with security tools like MISP, YARA, Suricata, Zeek, or Sigma rules.
- Prior experience working in fast-paced, cloud-native, or high-growth technology companies.
Responsibilities
- Develop, maintain, and operationalize a comprehensive threat intelligence program to proactively detect, analyze, and respond to cyber threats.
- Collect, analyze, and disseminate threat intelligence from open sources (OSINT), dark web monitoring, and proprietary sources.
- Identify and track threat actors, tactics, techniques, and procedures (TTPs) relevant to CoreWeave’s industry and cloud infrastructure.
- Collaborate with incident response teams to investigate and contain security incidents using intelligence-driven insights.
- Conduct proactive threat hunting activities to detect potential compromises or anomalous behavior in CoreWeave’s cloud environments.
- Develop and maintain threat intelligence automation pipelines to ingest, normalize, and correlate data from multiple sources.
- Implement threat intelligence feeds, SIEM integrations, and enrichment processes to enhance real-time security monitoring.
- Work closely with security engineering, SOC, and DevOps teams to integrate threat intelligence into security workflows.
- Provide regular briefings, reports, and recommendations on emerging threats, vulnerabilities, and mitigations to executive leadership and security teams.
- Represent CoreWeave in threat intelligence sharing communities, industry forums, and external collaborations.
Preferred Qualifications
-
No preferred qualifications provided.