Posted in

Staff Security Engineer for Threat Intel

Staff Security Engineer for Threat Intel

CompanyCoreWeave
LocationLivingston, NJ, USA, New York, NY, USA, Bellevue, WA, USA, Sunnyvale, CA, USA
Salary$230000 – $275000
TypeFull-Time
Degrees
Experience LevelExpert or higher

Requirements

  • 15+ years of experience in cyber threat intelligence, threat hunting, or security operations, with a focus on cloud environments.
  • Deep understanding of threat actor tactics, attack frameworks (MITRE ATT&CK), and malware analysis methodologies.
  • Experience with cyber threat intelligence platforms (TIPs), SIEM, SOAR, and EDR solutions.
  • Proficiency in scripting languages (Python, Bash, etc.) for automating threat intelligence workflows.
  • Strong knowledge of cloud security best practices, particularly in containerized and GPU-accelerated cloud environments.
  • Familiarity with dark web monitoring, intelligence collection techniques, and adversary tracking.
  • Excellent written and verbal communication skills for conveying intelligence insights to technical and non-technical audiences.
  • Experience in securing AI/ML workloads, high-performance computing (HPC), or GPU-accelerated environments.
  • Hands-on experience with security tools like MISP, YARA, Suricata, Zeek, or Sigma rules.
  • Prior experience working in fast-paced, cloud-native, or high-growth technology companies.

Responsibilities

  • Develop, maintain, and operationalize a comprehensive threat intelligence program to proactively detect, analyze, and respond to cyber threats.
  • Collect, analyze, and disseminate threat intelligence from open sources (OSINT), dark web monitoring, and proprietary sources.
  • Identify and track threat actors, tactics, techniques, and procedures (TTPs) relevant to CoreWeave’s industry and cloud infrastructure.
  • Collaborate with incident response teams to investigate and contain security incidents using intelligence-driven insights.
  • Conduct proactive threat hunting activities to detect potential compromises or anomalous behavior in CoreWeave’s cloud environments.
  • Develop and maintain threat intelligence automation pipelines to ingest, normalize, and correlate data from multiple sources.
  • Implement threat intelligence feeds, SIEM integrations, and enrichment processes to enhance real-time security monitoring.
  • Work closely with security engineering, SOC, and DevOps teams to integrate threat intelligence into security workflows.
  • Provide regular briefings, reports, and recommendations on emerging threats, vulnerabilities, and mitigations to executive leadership and security teams.
  • Represent CoreWeave in threat intelligence sharing communities, industry forums, and external collaborations.

Preferred Qualifications

    No preferred qualifications provided.