Threat Intelligence Manager

Wiz
Summary
Join Wiz, the fastest-growing cloud security startup, and become our Threat Intelligence Manager. Lead a new team investigating cloud-specific attacks and emerging threats. You will hunt and investigate novel cloud campaigns, develop detection tools and response procedures, and collaborate with the Threat Research and Incident Response team. This crucial role involves working with customers, producing external reports, and contributing to Wiz's vision of protecting customers from evolving cyber threats. The ideal candidate possesses extensive threat hunting, incident response, or threat intelligence experience, a strong understanding of threat intelligence frameworks, and excellent communication skills. This is an opportunity to make a significant impact in a rapidly growing market.
Requirements
- Be an independent self-learner
- 8+ years of experience in threat hunting, incident response or threat intelligence, conducting deep research with actionable conclusions
- Strong grasp of threat intelligence frameworks and tools, as well as cyber-attack lifecycles
- High familiarity with state-sponsored and/or cybercrime threat actors
- Familiarity with cloud Services, cloud environment architecture, and the major cloud providers (AWS, GCP, Azure)
- Excellent communication and teamwork skills
- Experience collaborating with Government / Federal Agencies
Responsibilities
- Build and lead a new team of cloud threat researchers and analysts investigating attacks against cloud environments and malware targeting cloud workloads
- Hunt and investigate novel emerging cloud campaigns and TTPs and develop detections and tools to protect customers from those threats
- Develop procedures and playbooks to be used when emerging threats are detected
- Work with customers and Wiz IR team in response to requests related to suspicious activities or potential incidents
- Produce externally facing materials based on your research and private intelligence reports about emerging threats for Wiz customers
Preferred Qualifications
- Demonstrated leadership experience
- Experience with threat detection rule formats (YARA, SIGMA, Snort, etc.) and data analysis (SQL)
- IR/Red Team/Threat hunting experience
- Knowledge in Kubernetes, OS internals (Windows/Linux), and networking