Threat Intelligence Manager

Remote - United States

Digital Shadows

Digital Shadows minimizes digital risk by identifying unwanted exposure and protecting against external threats.

View company page

Digital Shadows is fast growth company with offices in London, San Francisco, Dallas, Frankfurt and Singapore. Our mission is to protect organizations from external digital risks across the open, deep, and dark web. We do this by providing relevant threat intelligence, context, expertise, and remediation that enables organizations and security teams to focus on their core business in the digital era. Our SearchLight™ service combines scalable data analytics with threat intelligence analysts to monitor for cyber threats, data leakage, reputation risks and a whole lot more. You can learn more about us at www.digitalshadows.com or review the Forrester New Wave report where we were named the leader in Digital Risk Protection.

The Threat Intelligence Manager US is the primary leader of intelligence operations across the Photon team in the US time zone. This role is responsible for coordinating the production of key deliverables across US and UK-based personnel and guiding development of team members in intelligence tradecraft. The successful candidate should be a seasoned intelligence professional with experience in various settings who can assist the Director of Intelligence in achieving strategic objectives and represent the team both within the company and to external parties.

Requirements

● Lead five to ten intelligence analysts across multiple time zones to ensure ongoing coverage of the threat landscape

● Respond to client Requests for Intelligence (RFIs) with appropriately scoped intelligence requirements and delivery dates

● Appropriately triage and delegate RFI work across the global analyst team and ensure that established RFI workflow is followed

● Manage the production of Photon intelligence products including IntelligenceUpdates, Threat Profiles, and the Weekly Intelligence Summary to meet the VP’s Intelligence Requirements and PIRs, and update analyst reporting requirements to match

● Coordinate responses to requests for external content including blogs, webinars, PR requests, formal speaking engagements, and CFP responses

● Plan, execute, and oversee the development of security intelligence capability within the team including the scaling vulnerability research and analysis

● Adept at balancing the requirements of various stakeholders- internal and external and delivering cyber threat intelligence tradecraft, expertise and insights

● Develop and deliver training to the team to improve intelligence tradecraft, knowledge, and skills

● Balance the team’s workload across various project areas and training demands, while maintaining flexibility to respond to developing situations

● Other duties as assigned


Necessary Qualifications

● Previous experience (5+ years preferred) and a passion for both cyber security and intelligence analysis

● Strong personal organizational skills, team player and the ability to independently contribute and lead a cyber threat intelligence team with minimal oversight

● Up-to-date insights into current exploit techniques, vulnerability disclosures, data breach incidents, and security analysis techniques, combined with the understanding of the potential impact on an organization’s security posture

● Strong communicator with demonstrated writing ability, confident public speaker

● Conveys technical concepts in a clear and accessible way to those who are not subject matter experts

● Knowledge of threat intelligence sources and analysis methodologies including structured analytic techniques

● Knowledge of a wide variety of security technologies, processes, standards and frameworks

● Strong academic or professional experience (i.e., numerate degree, International Relations, Political Science)

● Inquisitive and curious mindset when it comes to threat identification

● Willing and eagerness to learn and able to adapt with the growth of the business

Familiarity with industry-standard project management or enterprise ticketing systems, cloud productivity applications


Preferred Qualifications

● Security Operations experience preferred but not required

● Foreign language skills are a plus, especially key languages (Russian, Mandarin, Farsi)● Additional technical understanding/skills such as basic malware functionality, coding/scripting languages (python), network intrusion analysis, etc. ● Cyber Security qualifications/accreditations (e.g. CISSP, CISM, CEH, GSEC, GCIH, GCIA, GCTI)

Individual Contributor

Teamwork: Works toward team goals, collaborates and seeks input from others

Results Driven: Focused on meeting deadlines and achieving expectations

Effective Communication: Understands channels of communication, delivery of information, tone and attitude in messaging, awareness of cultural differences, inclusiveness, and communication barriers

Client Focused: Demonstrates a sense of urgency, understands client needs and is solution-focused


Management/Leadership

Innovation: Creative, demonstrates executable ideas and new approaches

Influence & Judgement: Persuasiveness, decision making, analysis of problems

Personal Accountability: Emotional intelligence, managerial courage, leadership presence

Effective Communication: Understands channels of communication, delivery of information, tone and attitude in messaging, awareness of cultural differences, inclusiveness, and communication barriers

People Management: Ability to delegate, coach, and drive strategic activities

Benefits

  • Generous compensation package which includes; competitive salary, annual bonus, stock options and expense reimbursements related to travel and remote working.
  • Excellent benefits; generous health insurance, paid time off (PTO), volunteering days, paid parental leave, paid military leave, paid sick leave, long service award of additional PTO, employee assistance program and mental health support.
  • Spirited and energetic culture; regular team building events (in-person and online), monthly employee care packages, employee engagement activities with prizes, weekly updates from our co-founders, employee thank you cash awards, company swag!
  • Career Development: In-house training programs and online learning management platforms, employee career path programs, professional certification and education support.

Tags: Analytics CEH CISM CISSP Cloud Exploit GCIA GCIH GSEC Malware Python Scripting Security analysis Threat intelligence

Perks/benefits: Career development Competitive pay Equity Health care Parental leave Salary bonus Team events

Regions: Remote/Anywhere North America
Country: United States
Job stats:  16  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.