Lead Cyber Threat Intelligence Engineer

SoFi SoFi · Fintech · San Francisco, CA · Information Security

Lead Cyber Threat Intelligence Engineer at SoFi, responsible for protecting financial infrastructure by identifying, analyzing, and documenting advanced cyber threats. Focuses on understanding potential attackers and their methods, translating data into actionable intelligence for defense and strategic decisions. Involves mentoring junior analysts and maturing intelligence operations.

What you'd actually do

  1. Produce high-quality, actionable intelligence reports, briefings, and alerts for both technical stakeholders and executive leadership.
  2. Track threat actors and campaigns targeting the financial sector, focusing on their tactics, techniques, and procedures (TTPs).
  3. Execute proactive threat hunting and infrastructure tracking to identify new detection opportunities based on evolving TTPs.
  4. Utilize and manage the Threat Intelligence Platform (TIP) to gather, analyze, and enrich intelligence.
  5. Partner closely with the Security Operations Center (SOC), Insider Threat, Fraud Risk, and other stakeholders to gather and prioritize requirements based on their needs.

Skills

Required

  • Cybersecurity experience
  • Cyber Threat Intelligence experience
  • Exceptional written and verbal communication skills
  • Presenting complex threat information to non-technical stakeholders
  • SIEM platforms
  • Threat Intelligence Platforms (TIPs)
  • Network traffic analysis
  • Malware analysis concepts
  • Enterprise IT networks
  • Operating system principles
  • Exploit weaponization
  • Analyze large volumes of technical and non-technical data
  • Identify patterns, anomalies, and actionable insights
  • Scripting languages
  • Automate manual data enrichment processes

Nice to have

  • CISSP
  • CISM
  • GCIH
  • SANS FOR578
  • Financial services sector experience
  • STIX/TAXII
  • FS-ISAC

What the JD emphasized

  • dedicated experience in Cyber Threat Intelligence
  • proven ability to present complex threat information to non-technical stakeholders effectively
  • Hands-on experience with SIEM platforms, TIPs, network traffic analysis, and malware analysis concepts
  • Strong understanding of enterprise IT networks, operating system principles, and exploit weaponization
  • Demonstrated ability to analyze large volumes of technical and non-technical data to identify patterns, anomalies, and actionable insights
  • Familiarity with scripting languages to interact with datasets and automate manual data enrichment processes