ADP
ADP is Hiring a Senior Manager - Threat Intelligence Research and Reporting
Location: Roseland, NJ / Remote
About the Role We are seeking a highly motivated and experienced Sr. Manager -
Threat Intelligence Research and Reporting . This person will lead a group of analysts in our Cyber Threat Intelligence organization. This role is critical in shaping our understanding of the evolving threat landscape and providing actionable intelligence to stakeholders across the organization. You will manage a team of analysts, oversee intelligence collection and analysis, and ensure timely, high-quality reporting that informs both strategic and tactical decision‑making, and directly supports activities within Incident Response, Hunt, and Detection, as well as fielding requests for intelligence from across the enterprise.
What you’ll do:
Lead and mentor a team of analysts focused on cyber and fraud intelligence.
Manage threat analyst workflows to ensure timely and accurate production of actionable intelligence reports.
Develop and maintain threat intelligence reporting frameworks, technologies, and metrics.
Oversee the curation, analysis, and dissemination of threat intelligence to produce strategic, operational, and tactical reports that are timely and relevant to the business.
Apply continuous process improvement around the publication and dissemination of threat intelligence to enhance efficiency and effectiveness.
Produce executive‑level briefings and reports on emerging threats and trends impacting cyber & fraud risk.
Collaborate closely with incident response, vulnerability management, hunt & detection, risk, and other security teams to ensure intelligence is actionable.
Maintain relationships with industry peers, ISACs, government agencies, and commercial intelligence providers.
How you’ll measure success
Increased consumption of threat intelligence outputs and stakeholder engagement.
Demonstrated improvements in efficiency, quality, timeliness, and actionability of threat intelligence products.
Establishment of engagement and feedback metrics.
Expansion of internal threat intelligence gathering and enrichment.
Expanded integration of threat intelligence products into IT and security workflows.
Your skills:
Familiarity with open‑source intelligence (OSINT) tools and methodologies.
Knowledge of regulatory frameworks (e.g., NIST, ISO, GDPR, etc.).
Experience navigating and monitoring dark web forums and marketplaces.
Experience working in a global enterprise environment.
Critical thinking with the ability to assess threat data in the context of the organization and draw meaningful conclusions.
Ability to translate complex technical findings into clear, actionable reports.
Attention to detail and ability to tailor intelligence to the target audience.
Visual storytelling using charts, timelines, and diagrams to improve understanding of information.
To Succeed in This Role:
Bachelor’s degree in Cybersecurity, Intelligence Studies, Computer Science, or related field, or equivalent experience.
Your qualifications:
5+ years of experience in threat intelligence, cybersecurity, or related domains.
2+ years of experience in a leadership or managerial role.
Strong understanding of threat actor tactics, techniques, and procedures (TTPs), MITRE ATT&CK, and cyber kill chain.
Experience with threat intelligence platforms (TIPs) such as ThreatQ, ThreatConnect, or Recorded Future.
Exceptional writing and communication skills, with experience producing reports for technical and executive audiences.
Ability to manage multiple priorities in a fast‑paced environment.
Certifications such as GCTI, CISSP, or similar are a plus.
Like what you see?
Apply now!
Learn more about ADP at tech.adp.com/careers
What are you waiting for?
Apply today!
#J-18808-Ljbffr
About the Role We are seeking a highly motivated and experienced Sr. Manager -
Threat Intelligence Research and Reporting . This person will lead a group of analysts in our Cyber Threat Intelligence organization. This role is critical in shaping our understanding of the evolving threat landscape and providing actionable intelligence to stakeholders across the organization. You will manage a team of analysts, oversee intelligence collection and analysis, and ensure timely, high-quality reporting that informs both strategic and tactical decision‑making, and directly supports activities within Incident Response, Hunt, and Detection, as well as fielding requests for intelligence from across the enterprise.
What you’ll do:
Lead and mentor a team of analysts focused on cyber and fraud intelligence.
Manage threat analyst workflows to ensure timely and accurate production of actionable intelligence reports.
Develop and maintain threat intelligence reporting frameworks, technologies, and metrics.
Oversee the curation, analysis, and dissemination of threat intelligence to produce strategic, operational, and tactical reports that are timely and relevant to the business.
Apply continuous process improvement around the publication and dissemination of threat intelligence to enhance efficiency and effectiveness.
Produce executive‑level briefings and reports on emerging threats and trends impacting cyber & fraud risk.
Collaborate closely with incident response, vulnerability management, hunt & detection, risk, and other security teams to ensure intelligence is actionable.
Maintain relationships with industry peers, ISACs, government agencies, and commercial intelligence providers.
How you’ll measure success
Increased consumption of threat intelligence outputs and stakeholder engagement.
Demonstrated improvements in efficiency, quality, timeliness, and actionability of threat intelligence products.
Establishment of engagement and feedback metrics.
Expansion of internal threat intelligence gathering and enrichment.
Expanded integration of threat intelligence products into IT and security workflows.
Your skills:
Familiarity with open‑source intelligence (OSINT) tools and methodologies.
Knowledge of regulatory frameworks (e.g., NIST, ISO, GDPR, etc.).
Experience navigating and monitoring dark web forums and marketplaces.
Experience working in a global enterprise environment.
Critical thinking with the ability to assess threat data in the context of the organization and draw meaningful conclusions.
Ability to translate complex technical findings into clear, actionable reports.
Attention to detail and ability to tailor intelligence to the target audience.
Visual storytelling using charts, timelines, and diagrams to improve understanding of information.
To Succeed in This Role:
Bachelor’s degree in Cybersecurity, Intelligence Studies, Computer Science, or related field, or equivalent experience.
Your qualifications:
5+ years of experience in threat intelligence, cybersecurity, or related domains.
2+ years of experience in a leadership or managerial role.
Strong understanding of threat actor tactics, techniques, and procedures (TTPs), MITRE ATT&CK, and cyber kill chain.
Experience with threat intelligence platforms (TIPs) such as ThreatQ, ThreatConnect, or Recorded Future.
Exceptional writing and communication skills, with experience producing reports for technical and executive audiences.
Ability to manage multiple priorities in a fast‑paced environment.
Certifications such as GCTI, CISSP, or similar are a plus.
Like what you see?
Apply now!
Learn more about ADP at tech.adp.com/careers
What are you waiting for?
Apply today!
#J-18808-Ljbffr