1980 Cybersecurity jobs in Washington

Cybersecurity Threat Intelligence Analyst - Senior

20022 Washington, District Of Columbia ECS Limited

Posted 8 days ago

Job Viewed

Tap Again To Close

Job Description

ECS is seeking a Sr. Cybersecurity Threat Intelligence Analyst to work in our Washington, DC office.

  • Responsible for development and leadership of the CTI team establishment of the mission, maturity, optimizing, task management, and maintenance of threat intelligence processes and documentation.
  • Identify threat tactics, methodologies, gaps, and shortfalls.
  • Provide subject matter expertise to the development of cyber operations specific indicators.
  • Assist in the coordination, validation, and management of all-source collection requirements, plans, and/or activities.
  • Assist in the identification of intelligence collection shortfalls.
  • Monitor and report changes in threat dispositions, activities, tactics, capabilities, objectives, etc. as related to designated cyber operations warning problem sets
  • Monitor open-source websites for hostile content directed towards organizational or partner interests.
  • Monitor operational environment and report on adversarial activities which fulfill leadership's priority information requirements.
  • Produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies).
  • Provide information and assessments for the purposes of informing leadership and customers; developing and refining objectives; supporting operation planning and execution; and assessing the effects of operations.
  • Provide intelligence analysis and support to designated exercises, planning activities, and time sensitive operations.
  • Provide timely notice of imminent or hostile intentions or activities which may impact organization objectives, resources, or capabilities.
  • Report intelligence-derived significant network events and intrusions.
  • Work closely with planners, intelligence analysts, and collection managers to ensure intelligence requirements and collection plans are accurate and up to date.
Salary Range: $107,000 - $120,100

General Description of Benefits
  • 7+ years of experience in identifying potential and real threats to computing infrastructure and data and providing risk mitigation strategies and recommendations.
  • Review prioritized intelligence requirements (PIR) for additions, deletions, and changes in priority.
  • Ensure alignment with decision made by USCB leadership on program objectives, scope, and escalation criteria.
  • Research, analyze, and disseminate classified cyber threat briefings, reports, and information in accordance with all relevant controls for handling and disseminating classified information.
  • Strong written and verbal communication skills.
  • Experience using multiple search engines (e.g., Google, Yahoo, LexisNexis, DataStar) and tools in conducting open-source searches.
  • Experience using multiple analytic tools, databases, and techniques (e.g., Analyst's Notebook, Maltego, A-Space, Anchory, M3, divergent/convergent thinking, link charts, matrices, etc.).
  • Ability to communicate and brief complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.
  • Knowledge of concepts, terminology, and operations of a wide range of communications media (computer and telephone networks, satellite, fiber, wireless).
  • Knowledge of physical computer components and architectures, including the functions of various components and peripherals (e.g., CPUs, Network Interface Cards, data storage).
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
  • Ability to clearly articulate intelligence requirements into well-formulated research questions and data tracking variables for inquiry tracking purposes.
  • Ability to develop or recommend analytic approaches or solutions to problems and situations for which information is incomplete or for which no precedent exists.
  • Bachelor's degree or equivalent work experience.
  • 7+ years' cyber threat intelligence experience focused on Cyber operations fundamentals, operational intelligence analysis, and reporting.
  • Certifications addressing advanced IDS concepts, applications protocols, concepts of TCP/IP and the link layer, DNS, fragmentation, IDS fundamentals and initial deployment, IDS rules, IPv6, network architecture and event correlation, network traffic analysis and forensics, packet engineering, silk and other traffic analysis tools, TCP, Tcpdump filters, UDP and ICMP, focus on new attack vectors (emphasis on cloud computing technology, mobile platforms and tablet computers), new vulnerabilities, existing threats to operating environments, information systems audit process, IT governance and management.
  • Active TS/SCI clearance.
View Now

Lead Cybersecurity Threat Intelligence Analyst

21201 Baltimore, Maryland $150000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is searching for a highly skilled and experienced Lead Cybersecurity Threat Intelligence Analyst to be based in **Baltimore, Maryland, US**. This pivotal role will lead the development and execution of our organization's threat intelligence program, focusing on identifying, analyzing, and mitigating advanced persistent threats (APTs) and other sophisticated cyber adversaries. You will be instrumental in collecting, processing, and disseminating actionable threat intelligence to inform defensive strategies and enhance overall security posture. Responsibilities include managing a team of threat intelligence analysts, mentoring junior team members, and fostering a culture of continuous learning and innovation. You will conduct in-depth research on emerging threats, attack vectors, and adversary tactics, techniques, and procedures (TTPs). Developing and maintaining intelligence collection plans, source vetting, and producing high-quality threat reports for both technical and executive audiences are key functions. You will also collaborate with incident response, security operations, and vulnerability management teams to ensure intelligence is effectively operationalized. Experience with threat intelligence platforms (TIPs), SIEM solutions, and malware analysis tools is essential. A deep understanding of geopolitical factors influencing cyber threats and nation-state actor motivations is highly desirable. This role demands exceptional analytical capabilities, strong communication skills, and a proactive approach to cybersecurity. You will represent the company in industry forums and contribute to the broader cybersecurity community.
Requirements:
  • Bachelor's degree in Computer Science, Cybersecurity, or a related field; Master's degree preferred.
  • Minimum of 8 years of experience in cybersecurity, with at least 4 years focused on threat intelligence.
  • Proven experience leading a threat intelligence team or function.
  • Expertise in various intelligence disciplines, including OSINT, HUMINT, and SIGINT analysis.
  • Familiarity with frameworks like MITRE ATT&CK and cyber kill chains.
  • Strong technical skills in network security, endpoint security, and malware analysis.
  • Excellent written and verbal communication skills, with experience presenting to senior leadership.
  • Relevant certifications such as GCTI, CTI, or CISSP are a plus.
View Now

Senior Cybersecurity Threat Intelligence Analyst

21201 Baltimore, Maryland $140000 Annually WhatJobs

Posted today

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leading technology firm headquartered in **Baltimore, Maryland, US**, is actively seeking a Senior Cybersecurity Threat Intelligence Analyst to bolster its advanced security operations center. This pivotal role demands a proactive and analytical mindset to identify, track, and mitigate sophisticated cyber threats targeting the organization's digital assets. You will be at the forefront of understanding adversary tactics, techniques, and procedures (TTPs), providing critical intelligence to inform defensive strategies and protect against emerging cyber risks.

Responsibilities:
  • Develop and execute strategic threat intelligence programs, focusing on identifying and analyzing advanced persistent threats (APTs) and other cyber adversaries relevant to our industry.
  • Collect, process, and analyze vast amounts of data from various sources, including open-source intelligence (OSINT), dark web monitoring, security feeds, and internal security tools.
  • Produce actionable intelligence reports, briefings, and alerts for various stakeholders, including executive leadership, security operations teams, and incident response teams.
  • Develop and maintain threat actor profiles, including their motivations, capabilities, TTPs, and infrastructure.
  • Collaborate with security operations center (SOC) analysts, incident responders, and security engineers to integrate threat intelligence into defensive measures, such as SIEM rules, IDS/IPS signatures, and firewall policies.
  • Conduct malware analysis, reverse engineering (where applicable), and forensic investigations to understand threat actor methodologies.
  • Identify trends and patterns in threat data to predict future attacks and inform proactive security measures.
  • Build and maintain relationships with external intelligence sharing communities and government agencies.
  • Contribute to the development and improvement of threat hunting methodologies and playbooks.
  • Mentor junior analysts and share knowledge across the cybersecurity team.
  • Present findings and recommendations to technical and non-technical audiences.

Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field. A Master's degree is a plus.
  • Minimum of 6 years of experience in cybersecurity, with at least 4 years specifically focused on threat intelligence, incident response, or digital forensics.
  • Demonstrated expertise in cyber threat intelligence frameworks (e.g., MITRE ATT&CK, Cyber Kill Chain).
  • Proficiency in utilizing threat intelligence platforms (TIPs) and security information and event management (SIEM) systems.
  • Strong understanding of networking protocols, operating systems, and common attack vectors.
  • Experience with scripting languages (e.g., Python) for automating data analysis and collection.
  • Excellent analytical, critical thinking, and problem-solving skills.
  • Ability to communicate complex technical information clearly and concisely, both verbally and in writing.
  • Relevant certifications such as GCTI, CISSP, OSCP, or CEH are highly valued.
  • Ability to obtain a security clearance if required.
This is an exceptional opportunity to make a significant impact on cybersecurity posture within a forward-thinking organization based in **Baltimore, Maryland, US**.
View Now

Senior Cybersecurity Threat Intelligence Analyst

20001 Washington, District Of Columbia $125000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is looking for a highly skilled and proactive Senior Cybersecurity Threat Intelligence Analyst to join their elite security operations team in Washington, D.C., US . This position plays a crucial role in safeguarding the organization's digital assets by identifying, analyzing, and disseminating actionable threat intelligence. The Senior Analyst will be responsible for monitoring global threat landscapes, tracking advanced persistent threats (APTs), and developing proactive defense strategies. Key responsibilities include conducting in-depth research on emerging cyber threats, vulnerabilities, and attacker tactics, techniques, and procedures (TTPs). You will analyze threat data from various sources, including open-source intelligence (OSINT), technical indicators, and proprietary feeds, to produce comprehensive threat intelligence reports. The role involves collaborating with incident response teams, security engineering, and IT operations to integrate intelligence into defensive measures. You will also be responsible for developing and maintaining threat models, conducting vulnerability assessments, and providing strategic guidance on cybersecurity best practices. A Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field is required; a Master's degree is preferred. A minimum of 7 years of experience in cybersecurity, with at least 4 years focused on threat intelligence, incident response, or security operations, is essential. Deep understanding of various threat actor groups, malware analysis, network security, and common attack vectors is mandatory. Certifications such as CISSP, GIAC, or CEH are highly valued. Excellent analytical, critical thinking, and communication skills are necessary to effectively convey complex technical information. Join our team and help us stay ahead of evolving cyber threats.
View Now

Senior Cybersecurity Engineer - Threat Intelligence

21201 Baltimore, Maryland $135000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a prominent cybersecurity firm dedicated to protecting critical infrastructure, is seeking a highly experienced Senior Cybersecurity Engineer specializing in Threat Intelligence to join their advanced operations center in Baltimore, Maryland, US . This crucial role will be instrumental in developing and maintaining the organization's threat intelligence capabilities, identifying emerging threats, and providing actionable insights to mitigate risks. The ideal candidate will possess a deep understanding of the global threat landscape, attack vectors, malware analysis, and threat actor methodologies. Responsibilities include collecting, analyzing, and disseminating threat intelligence from various sources, developing custom detection rules and signatures, conducting threat hunting operations, and supporting incident response activities by providing context and indicators of compromise (IOCs). You will also play a key role in enhancing security monitoring tools and processes, and collaborating with internal security teams to improve the overall security posture. A strong background in network security, endpoint security, and security operations center (SOC) environments is essential. The successful candidate will have excellent analytical, research, and communication skills, with the ability to translate complex technical information into clear, concise reports. A Bachelor's degree in Computer Science, Cybersecurity, or a related field, along with at least 7 years of experience in cybersecurity, with a minimum of 4 years focused on threat intelligence, security operations, or incident response, is required. Experience with threat intelligence platforms (TIPs), SIEM solutions, and scripting languages (e.g., Python) is highly advantageous. Certifications such as CISSP, GIAC GCIH, or GCTI are a plus. This is an outstanding opportunity to contribute to national security and critical infrastructure protection from the vibrant tech scene of Baltimore, Maryland, US . Our client offers a challenging and rewarding work environment. A full-time commitment is expected.

Key Responsibilities:
  • Develop and manage threat intelligence programs and platforms
  • Collect, analyze, and report on cyber threats and trends
  • Identify and track threat actors and their methodologies
  • Develop detection signatures and hunting queries
  • Support incident response with timely threat intelligence
  • Enhance security monitoring and analytics capabilities
  • Conduct proactive threat hunting exercises
  • Collaborate with internal security teams to mitigate risks
  • Stay abreast of the latest cybersecurity threats and vulnerabilities
  • Communicate threat landscape information to stakeholders
Join a leading cybersecurity organization in Baltimore, Maryland, US , and make a real impact on cybersecurity defense. This role requires a full-time engagement.
View Now

Senior Cybersecurity Analyst - Threat Intelligence

21201 Baltimore, Maryland $135000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client, a leader in safeguarding digital assets, is actively seeking a highly skilled Senior Cybersecurity Analyst specializing in Threat Intelligence to join their elite security operations center in Baltimore, Maryland, US . This pivotal role involves the proactive identification, analysis, and mitigation of cyber threats targeting our organization and its clients. The ideal candidate will possess a comprehensive understanding of the global threat landscape, advanced threat actor methodologies, and the ability to translate complex intelligence into actionable security measures. You will be instrumental in developing and refining threat intelligence capabilities, enhancing our defensive posture, and protecting critical information assets.

Key Responsibilities:
  • Monitor, collect, and analyze threat intelligence from various sources, including open-source intelligence (OSINT), commercial feeds, and internal security telemetry.
  • Identify emerging threats, vulnerabilities, and attack vectors relevant to the organization's industry and infrastructure.
  • Develop and disseminate actionable threat intelligence reports, alerts, and briefings to relevant stakeholders, including IT security teams and senior management.
  • Conduct in-depth analysis of malware, phishing campaigns, and advanced persistent threats (APTs).
  • Develop and maintain threat hunting hypotheses and methodologies to proactively identify undetected threats.
  • Contribute to the development and improvement of security tools and technologies, including SIEM, SOAR, and threat intelligence platforms.
  • Build and maintain relationships with external threat intelligence communities, industry peers, and government agencies.
  • Provide expertise and guidance on threat actor TTPs (Tactics, Techniques, and Procedures) to inform incident response and security architecture decisions.
  • Develop and execute security awareness training programs based on current threat trends.
  • Support incident response activities by providing timely and relevant threat context.
  • Perform vulnerability assessments and penetration testing support.
  • Manage and mature the organization's threat intelligence program.
  • Stay abreast of the latest cybersecurity trends, threats, and defensive strategies.

Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field; Master's degree preferred.
  • Minimum of 5 years of experience in cybersecurity, with a significant focus on threat intelligence, security operations, or incident response.
  • Demonstrated experience in analyzing threat data, identifying indicators of compromise (IOCs), and understanding threat actor motivations and capabilities.
  • Proficiency with threat intelligence platforms (TIPs), SIEM solutions (e.g., Splunk, QRadar), and security analytics tools.
  • Strong understanding of networking protocols, operating systems, and common attack vectors.
  • Experience with malware analysis, reverse engineering, or digital forensics is a plus.
  • Excellent analytical, critical thinking, and problem-solving skills.
  • Strong written and verbal communication skills, with the ability to present complex information clearly.
  • Relevant certifications such as CISSP, GCTI, CEH, or CompTIA Security+ are highly desirable.
  • Ability to work independently and collaboratively in a high-pressure environment.
This is a critical role for a dedicated cybersecurity professional looking to make a significant impact on the security posture of our client in Baltimore, Maryland, US . Apply now to join a leading team in protecting vital digital infrastructure.
View Now

Senior Cybersecurity Analyst - Threat Intelligence

21201 Baltimore, Maryland $110000 Annually WhatJobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

full-time
Our client is seeking a highly skilled Senior Cybersecurity Analyst specializing in Threat Intelligence to join their advanced security operations center in **Baltimore, Maryland, US**. This critical role will focus on identifying, analyzing, and mitigating sophisticated cyber threats targeting the organization's digital assets. The Senior Analyst will be responsible for gathering threat intelligence from various sources, including open-source intelligence (OSINT), commercial feeds, and internal security tools, to develop actionable insights and early warnings. You will conduct in-depth analysis of malware, attacker tactics, techniques, and procedures (TTPs), and threat actor methodologies to enhance defensive strategies. Responsibilities include developing and maintaining threat models, supporting incident response efforts with timely intelligence, and creating detailed threat reports for stakeholders at all levels. The ideal candidate will possess a Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field, along with significant hands-on experience in cybersecurity operations, threat hunting, or intelligence analysis. Certifications such as CISSP, GCTI, or CEH are highly preferred. Proficiency in security tools like SIEM, EDR, SOAR, and threat intelligence platforms is required. Strong analytical, critical thinking, and communication skills are essential for success in this role. You should be adept at translating complex technical information into clear, concise recommendations for both technical and non-technical audiences. This is an excellent opportunity for a proactive security professional to contribute to the protection of a leading organization from evolving cyber threats.

Qualifications:
  • Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field.
  • Minimum of 5 years of experience in cybersecurity, with a focus on threat intelligence, incident response, or security operations.
  • Proven experience in threat hunting, malware analysis, and understanding of attacker TTPs.
  • Proficiency with SIEM, IDS/IPS, EDR, and other security monitoring tools.
  • Experience with threat intelligence platforms and data analysis.
  • Strong understanding of networking protocols, operating systems, and cloud security concepts.
  • Excellent analytical, problem-solving, and communication skills.
  • Relevant cybersecurity certifications (CISSP, GCTI, CEH) are a strong plus.
  • Must be eligible to work in the United States.
View Now
Be The First To Know

About the latest Cybersecurity Jobs in Washington !

Threat Intelligence Analysts

21276 Baltimore, Maryland eTeam

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

Job Title: Threat Intelligence Analyst
Duration-6-12 months

Location - Baltimore MD

Job Summary:

We are seeking a skilled and detail-oriented Threat Intelligence Analyst to join our cybersecurity team. The ideal candidate will be responsible for collecting, analyzing, and interpreting threat data from various internal and external sources to identify current and emerging security threats. This role plays a critical part in enhancing our organization's threat detection and response capabilities.

Key Responsibilities:
  • Monitor and analyze threat intelligence feeds, indicators of compromise (IOCs), and emerging cyber threats.
  • Provide timely, actionable intelligence reports to stakeholders across security operations, incident response, and executive leadership.
  • Conduct in-depth research into cyber threat actors, tactics, techniques, and procedures (TTPs).
  • Correlate threat data with internal security events to support detection and mitigation efforts.
  • Collaborate with SOC analysts, incident response teams, and other departments to share findings and improve threat visibility.
  • Develop and maintain threat intelligence databases, dashboards, and knowledge bases.
  • Contribute to the development of detection rules and playbooks based on intelligence findings.
  • Participate in threat hunting activities and red/blue team exercises.
  • Stay current with the global cybersecurity landscape, vulnerabilities, and security best practices.


Required Qualifications:
  • Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or related field (or equivalent experience).
  • 2+ years of experience in cybersecurity, with at least 1 year in threat intelligence or a related field.
  • Familiarity with threat intelligence platforms (TIPs), SIEM tools (e.g., Splunk, QRadar), and MITRE ATT&CK framework.
  • Strong analytical, research, and communication skills.
  • Understanding of malware analysis, phishing, and social engineering tactics.
  • Knowledge of IP networking, endpoint security, and common cybersecurity tools.
View Now

Threat Intelligence Engineer

20080 Washington, District Of Columbia Coinbase

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

Ready to be pushed beyond what you think you're capable of?
At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Security is a primary competency at Coinbase, and the Threat Intelligence team within Security Operations keeps a watchful eye over every aspect of it. Every day, we go to battle against some of the most sophisticated attackers in the world to protect billions of dollars worth of digital assets and ensure that our customers and employees can enjoy a safe, trusted experience. As Coinbase scales globally, our team is scaling along with it, using a blend of tooling, automation, and strategic team growth to ensure that we're well-equipped to protect the next billion users of crypto.
Join our dynamic threat intelligence team at Coinbase to enhance our threat intelligence platform. Your work will directly support our mission of securing crypto assets by developing capabilities within Vertex Synapse to address the evolving needs of our stakeholders and enhance the efficacy of our threat detection and response.
*What you'll be doing (ie. job duties):*
* Develop and integrate external and internal enrichments and power-ups with Vertex Synapse
* Collect and support stakeholder intelligence needs through tool development within Vertex Synapse to satisfy collection management requirements
* Quickly create and fine-tune tools to improve security operations processes and ensure the tools integrate into data processing pipelines
* Enhance the efficiency of processes within Vertex Synapse related to the collection, analysis, storage, tagging, and enrichment of indicators of compromise (IoCs) and associated data to improve the detection and mitigation of cyber threats
* Work closely with security operations teams to align on collection requirements and translate operational requirements into technical specifications
*What we look for in you (ie. job requirements):*
* 3+ years of experience developing enrichments, automations, and tagging in threat intelligence platforms, specifically Vertex Synapse
* Technical proficiency in software development, including demonstrable experience in creating and maintaining security tools
* Exceptional analytical skills to dissect complex problems and synthesize actionable insights, supported by an ability to discover opportunities for unique data correlations
* Ability to rapidly prototype and iterate tool development to adapt to evolving threat intelligence needs
* Experience managing security telemetry data
* Excellent communication skills and a collaborative mindset to work efficiently with cross-functional teams
Job #: P70662
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include target bonus + target equity + benefits (including medical, dental, vision and 401(k)).
Pay Range:
$144,500-$170,000 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations Data Privacy Notice for Job Candidates and Applicants
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available Disclosure
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact mailto:
View Now

Threat Intelligence Engineer

21401 Annapolis, Maryland Coinbase

Posted 13 days ago

Job Viewed

Tap Again To Close

Job Description

Ready to be pushed beyond what you think you're capable of?
At Coinbase, our mission is to increase economic freedom in the world. It's a massive, ambitious opportunity that demands the best of us, every day, as we build the emerging onchain platform - and with it, the future global financial system.
To achieve our mission, we're seeking a very specific candidate. We want someone who is passionate about our mission and who believes in the power of crypto and blockchain technology to update the financial system. We want someone who is eager to leave their mark on the world, who relishes the pressure and privilege of working with high caliber colleagues, and who actively seeks feedback to keep leveling up. We want someone who will run towards, not away from, solving the company's hardest problems.
Our is intense and isn't for everyone. But if you want to build the future alongside others who excel in their disciplines and expect the same from you, there's no better place to be.
While many roles at Coinbase are remote-first, we are not remote-only. In-person participation is required throughout the year. Team and company-wide offsites are held multiple times annually to foster collaboration, connection, and alignment. Attendance is expected and fully supported.
Security is a primary competency at Coinbase, and the Threat Intelligence team within Security Operations keeps a watchful eye over every aspect of it. Every day, we go to battle against some of the most sophisticated attackers in the world to protect billions of dollars worth of digital assets and ensure that our customers and employees can enjoy a safe, trusted experience. As Coinbase scales globally, our team is scaling along with it, using a blend of tooling, automation, and strategic team growth to ensure that we're well-equipped to protect the next billion users of crypto.
Join our dynamic threat intelligence team at Coinbase to enhance our threat intelligence platform. Your work will directly support our mission of securing crypto assets by developing capabilities within Vertex Synapse to address the evolving needs of our stakeholders and enhance the efficacy of our threat detection and response.
*What you'll be doing (ie. job duties):*
* Develop and integrate external and internal enrichments and power-ups with Vertex Synapse
* Collect and support stakeholder intelligence needs through tool development within Vertex Synapse to satisfy collection management requirements
* Quickly create and fine-tune tools to improve security operations processes and ensure the tools integrate into data processing pipelines
* Enhance the efficiency of processes within Vertex Synapse related to the collection, analysis, storage, tagging, and enrichment of indicators of compromise (IoCs) and associated data to improve the detection and mitigation of cyber threats
* Work closely with security operations teams to align on collection requirements and translate operational requirements into technical specifications
*What we look for in you (ie. job requirements):*
* 3+ years of experience developing enrichments, automations, and tagging in threat intelligence platforms, specifically Vertex Synapse
* Technical proficiency in software development, including demonstrable experience in creating and maintaining security tools
* Exceptional analytical skills to dissect complex problems and synthesize actionable insights, supported by an ability to discover opportunities for unique data correlations
* Ability to rapidly prototype and iterate tool development to adapt to evolving threat intelligence needs
* Experience managing security telemetry data
* Excellent communication skills and a collaborative mindset to work efficiently with cross-functional teams
Job #: P70662
*Pay Transparency Notice:* Depending on your work location, the target annual salary for this position can range as detailed below. Full time offers from Coinbase also include target bonus + target equity + benefits (including medical, dental, vision and 401(k)).
Pay Range:
$144,500-$170,000 USD
Please be advised that each candidate may submit a maximum of four applications within any 30-day period. We encourage you to carefully evaluate how your skills and interests align with Coinbase's roles before applying.
Commitment to Equal Opportunity
Coinbase is proud to be an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, creed, gender, national origin, age, disability, veteran status, sex, gender expression or identity, sexual orientation or any other basis protected by applicable law. Coinbase will also consider for employment qualified applicants with criminal histories in a manner consistent with applicable federal, state and local law. For US applicants, you may view the in certain locations, as required by law.
Coinbase is also committed to providing reasonable accommodations to individuals with disabilities. If you need a reasonable accommodation because of a disability for any part of the employment process, please contact us at accommodations Data Privacy Notice for Job Candidates and Applicants
Depending on your location, the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) may regulate the way we manage the data of job applicants. Our full notice outlining how data will be processed as part of the application procedure for applicable locations is available Disclosure
For select roles, Coinbase is piloting an AI tool based on machine learning technologies to conduct initial screening interviews to qualified applicants. The tool simulates realistic interview scenarios and engages in dynamic conversation. A human recruiter will review your interview responses, provided in the form of a voice recording and/or transcript, to assess them against the qualifications and characteristics outlined in the job description.
For select roles, Coinbase is also piloting an AI interview intelligence platform to transcribe and summarize interview notes, allowing our interviewers to fully focus on you as the candidate.
*The above pilots are for testing purposes and Coinbase will not use AI to make decisions impacting employment*. To request a reasonable accommodation due to disability, please contact mailto:
View Now
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Jobs View All Jobs in Washington