Threat Intelligence Automation Developer (orchestration)

Salesforce Salesforce · Enterprise · Seattle, WA +3

Salesforce is seeking a Threat Intelligence Automation Developer to engineer and optimize automated pipelines for processing adversary data and generating insights. The role involves architecting frameworks for Threat Intelligence (TI), Security Operations Center (SOC), and Incident Response (IR) practitioners, automating detection, and streamlining intelligence delivery. Key responsibilities include engineering programmatic solutions within TI and SOAR ecosystems, collaborating with Threat Researchers to automate detection frameworks, evaluating data streams, optimizing the intelligence production cycle, and designing systems where AI agents integrate into human workflows. The role also requires building and maintaining shared system context for AI reliability and contributing to security engineering workflows.

What you'd actually do

  1. Architect and implement bespoke programmatic solutions and cross-platform integrations within the Threat Intelligence Platform (TIP) and SOAR ecosystems to drive high-velocity security operations at scale.
  2. Work alongside Threat Researchers to decode sophisticated adversary tradecraft, transforming manual investigative workflows into automated and repeatable detection frameworks.
  3. Function as a pivotal member of the Collections Team; oversee the evaluation of novel data streams and serve as the technical authority for sophisticated data ingestion and normalization initiatives.
  4. Optimize the intelligence production cycle by engineering automations that eliminate manual processing burdens, empowering practitioners to prioritize complex strategic analysis.
  5. Design and orchestrate complex systems where AI agents integrate seamlessly into human workflows, driving efficiency and innovation at scale.

Skills

Required

  • Cybersecurity domain experience
  • Security engineering, DevSecOps, or automation workflows
  • Python development
  • Bash scripting
  • JavaScript scripting
  • SOAR platform orchestration (e.g., Cortex XSOAR, Splunk Phantom, Tines, Swimlane)
  • Threat Intelligence Platforms (e.g., Vertex Synapse, ThreatConnect, Anomali, MISP)
  • Normalizing unstructured data via RESTful APIs and Regex
  • JSON data formats
  • Version control systems (git)
  • CI/CD best practices
  • Amazon Web Services (AWS)
  • Linux environments
  • Unix command-line utilities
  • AI tools (e.g., Claude Code, GitHub Copilot, Codex, Cursor)
  • Prompt engineering
  • Design and operation of large-scale distributed systems
  • Builder's mindset
  • Collaboration within a global, geographically dispersed workforce
  • Bachelor’s degree in Cybersecurity, Computer Science, or related technical discipline; or equivalent experience

Nice to have

  • Threat Intelligence Platforms and building integrations
  • Security analysis tools (Jupyter notebooks, Splunk, ElasticSearch)
  • Microsoft Azure
  • Google Cloud
  • Graph modeling (Vertex Synapse)
  • Cloud-native automation
  • Serverless computing (AWS Lambda, Azure Functions)
  • GCTI, GPYC certifications

What the JD emphasized

  • Advanced Python development ability for complex programmatic requirements
  • Hands-on experience implementing SOAR platform orchestration utilizing industry-standard tools
  • Familiarity with the administration and expansion of Threat Intelligence Platforms
  • Advanced prompt engineering skills
  • Possess a builder’s mindset, characterized by an instinctive drive to architect programmatic solutions and scripts that eliminate inefficient manual tasks.

Other signals

  • AI agents integrate seamlessly into human workflows
  • building and maintaining the shared system context
  • AI to operate accurately and reliably
  • Advanced prompt engineering skills
  • cultivate the system context that makes AI outputs reliable, secure, and production-ready