Senior Cyber Threat Intelligence Engineer

SoFi SoFi · Fintech · San Francisco, CA · Information Security

Seeking a Senior Cyber Threat Intelligence Engineer to protect financial infrastructure by collecting, processing, and analyzing intelligence. This role involves designing and maintaining intelligence pipelines, reporting on threats, and collaborating with security teams to make intelligence-led decisions for proactive defense.

What you'd actually do

  1. Collect, normalize, enrich, and tag Indicators of Compromise (IOCs) from commercial vendors, open-source intelligence, and partners. Operationalize intelligence into actionable decisions across our control stack. Assess intel ligence quality and reduce noise through lifecycle management of intelligence indicators.
  2. Design, develop, and maintain pipelines to ingest intelligence into our Threat Intelligence Platform (TIP). Develop automation to enrich and integrate intelligence. Improve efficiency and scalability of the Threat Intelligence Platform (TIP).
  3. Build reporting capabilities to ingest and disseminate articles, vendor feeds, and threat alerts applicable to our environment. Enable the preparation of actionable Flash Reports, Threat Briefings, and detailed profiles on threat actor motivations and capabilities.
  4. Coordinate directly with Security Operations Center (SOC), Insider Threat, Fraud Risk, and other key stakeholders to prioritize alerts, mitigate emerging threats, and contextualize intelligence. Gather requirements from key stakeholders to prioritize the development of feeds or enrichments to support their business needs.
  5. Track threat actors, malware families, and vulnerabilities relevant to our operations. Align intelligence gathering priorities to enterprise risks and relevant threat actors.

Skills

Required

  • Python
  • MITRE ATT&CK Framework
  • Cyber Kill Chain Methodology
  • Diamond Model of Intrusion Analysis
  • SIEM
  • Log Management
  • Cybersecurity Engineering
  • Threat Intelligence Engineering

Nice to have

  • C|TIA
  • GCTI
  • GCIH
  • STIX
  • TAXII
  • Malware Analysis
  • Reverse Engineering
  • Network Traffic Analysis
  • HTTP Header Analysis

What the JD emphasized

  • Proven experience engineering solutions in cybersecurity and/or threat intelligence
  • Hands-on experience coding in Python
  • Practical knowledge of industry-standard cybersecurity attack frameworks such as the MITRE ATT&CK Framework, Cyber Kill Chain Methodology, or the Diamond Model of Intrusion Analysis
  • Utilizing SIEM/log management tools
  • Ability to differentiate between true and false positives, assess the credibility of threat feeds, and apply intelligence to achieve operational goals